Jump to content

Search the Community

Showing results for tags 'packet injection'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 4 results

  1. Hello people, I was recently doing some work with those VEX Robotics wireless control robots and I had some ideas about packet sniffing attacks, replay attacks, man in the middle attacks, and de-authentication attacks. The robots use the Vex cortex, which has a wireless adapter through a USB port, it says that is is 2.4 GHz, and another USB wireless adapter is plunged into a controller, like a joystick. My school did a competition with these robots, and it ended last week, now we are doing another thing just as a school, they said we were doing battle bots. When I did some research I hadn't seen anybody do anything like this and I though I would look into it. When I was doing research I found that, the robots don't use any encryption it is end to end, the controllers or create there own network an access point that the robot connects to, the network it creates is hidden it does not broadcast its SSID and has to be pared with the cortex, they are 2.4 GHz, they all have independent channels or mac addresses (many can operate at the same time without interference). The first thing I though of would be a deauth attack, where I would send out deauth frames to disconnect their robot from the controller from the cortex leaving their robot powerless, I was tinging I could do this with Aircrack-ng, put my wireless card into monitor mode with airmon-ng, find the mac address and channel of the robot with airodump-ng, deauth with aireplay-ng. The next attack I though of was if I could intercept packets from the remote to the cortex and either replay them to keep doing an operation or send in my own by finding out what commands correlated to what packets and injecting them while impersonating the robot. I have not done much with packet sniffing/replay/injection if anybody knows anything on how I could do that? or if anybody has done anything with these robots? or if you have any ideas on wireless attacks? I am all ears and I would love help and suggestions, this seems like a really cool project. I would love to hear your thoughts, thank you
  2. Was wondering if it is possible to inject packets while the PS is in monitor mode? Or would this be pointless? if possible you could carry out an arp/nmap scan and it could be made to appear it’s coming from the host pc. Obviously I know one of the net modes allows the PS to present one IP on one interface and another IP on the other.
  3. Hi guys. Situation So I've had some pineapple issues and currently waiting on receiving a new one. In the meantime I thought I'd partition my macbook and try installing Kali linux on it! (great fun ) These are the specs I'm working with: Macbook pro (mid 2009) 10.10 Yosemite - BCM43xxx wireless card Kali Linux (dual boot) 1.1 Question 1 - My n00b question is has anyone any experience with wireless usb adapters supporting packet injection? 2 - Even though I'm dual booting into Kali should I be concerned that the hardware is Mac OS X and should I be specifically looking for Mac OS X support from vendors? Or because I'm dual booting, is Linux support ok? I'm looking at something like these from the Alfa vendors http://www.amazon.com/Alfa-AWUS036NHA-Wireless-Adaptor-Compatible/dp/B004Y6MIXS http://www.amazon.com/Alfa-AWUS036NH-Wireless-Long-Range-Screw-On/dp/B003YIFHJY/ref=pd_sim_pc_5?ie=UTF8&refRID=10DB754Q0SEQPJYAVMA2 Thanks, I appreciate any answers. On a side note, not sure if anyone had this issue but when I was booting into Kali I was getting some weird stuff like not seeing my home wifi - and when I intermittently saw it I couldn't log-in successfully. When I deleted my home network from the Sys Preferences--> Network Panel and booted into Kali I was then able to log-in successfully!
  4. Title says it all, looking to get a internal wifi card with support for packet injection in Back|Track or Arch linux. Can yall help me out?
×
×
  • Create New...