Jump to content

Search the Community

Showing results for tags 'pinejector'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • WiFi Pineapple
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Gear
    • Hak5 Cloud C²
    • Plunder Bug
    • Bash Bunny
    • Signal Owl
    • USB Rubber Ducky
    • Packet Squirrel
    • LAN Turtle
    • Screen Crab
    • Shark Jack
    • Key Croc
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 1 result

  1. Hi, I was hoping to leverage PineAP's frame injection capability to execute key reinstallation attacks. However, when I tried injecting arbitrary packets with PineAP, I couldn't pick up said packets on another monitor. On my machine, I set up a Fedora VM with wireshark/airmon-ng and a USB WiFi card to monitor packets, and the Pineapple next to the WiFi card. From the Pineapple, I used aireplay-ng on wlan1mon to play a deauthentication attack, and successfully captured the deauth packets on my VM. I then copied the packet's hex stream from wireshark, and tried to play the same attack using PineAP. (MACs changed) c0 00 3a 01 60 ab 67 12 34 56 e8 cc 18 22 34 56 e8 cc 18 12 34 56 50 27 07 00 < client MAC > < AP MAC > I pasted the above (minus the comments) into the payload field, with parameters; Channel: 3 (the same channel I was monitoring on with the VM) Frame count: 100 Send delay: 100ms However, I didn't pick up any such packets on my VM. Same thing happens on different channels, as well as after I rebooted the Pineapple. I tried to use the CLI, but I did not pick up any packets from this either: $ cat test.packet c0 00 3a 01 60 ab 67 12 34 56 e8 cc 18 22 34 56 e8 cc 18 12 34 56 50 27 07 00 $ pineap inject test.packet 3 100 100 Am I missing something on how to inject frames using PineAP? Doesn't seem like a hardware issue, since aireplay-ng is able to use the radios to replay packets. Additionally, instead of blocking for (100 packets * 100ms delay per packet) = 10s, the above injections, from the web UI and the pineap invocation, instantly returned. Is this command supposed to be non-blocking? Thanks!
×
×
  • Create New...