Jump to content

Search the Community

Showing results for tags 'splash'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 1 result

  1. There is "normal" concept of using the Pineapple in the field which essentially looks like: wlan0 = "FreeWiFi" , wlan1 = client mode connected to "BoingoHotspot" : Under this configuration you as the pineapple owner are responsible for getting through the wlan1 "BoingoHotspot" splash page/portal first so that you are actually sharing their connection but no one on FreeWiFi knows this. But, what I like to call HotSpot Piggybacking looks something like this: wlan0 = "BoingoHotspot2", wlan1 = client mode connected to "BoingoHotspot" : With this configuration you are fishing for a legitimate BoingoHotspot user to authenticate themselves on what they believe is a legitimate Boingo AP. It looks and behaves exactly like the real thing because they are seeing the real splash page. But, once they authenticate themselves you and any other user on the Pineapple afterwards has internet. Also, you are still the MITM and can see all users traffic i.e. use tcpdump or ettercap or turn on sslstrip etc. Does anybody else use this method? I realize it can take time, but I think it's a viable alternative if you don't have free wifi around or a cell stick/hotspot to use with your pineapple. And it can work in coffee shops or airports equally well, it just requires a high turnover of users who logon to their local account with the hotspot provider.
×
×
  • Create New...