Search the Community
Showing results for tags 'spoof'.
Found 4 results
Hi all, Can a Ubertooth One be used to impersonate a BT device? lock, speaker, headset, etc.? Spoofing the MAC should be trivial, I'm just wondering about if it can present itself as the above devices/services. It doesn't have to do the job, just claim to for the pairing. TIA
Hello everyone, Today I have been playing with the SpoofDNS feature of the Packet Squirrel (payload 2). I noticed the following: > Redirection of spoofed URL works fine > Internet works fine > Internal resources by DNS name are not accessible (but can be pinged) This almost never causes problems on a private PC but might cause problems on a company network. The user is able to access the internet but can no longer access internal websites. For example, we host a ticket system on the network (tickets.company.nl) which, for example, was no longer accessible. All other internet DNS queries where resolved ok. SpoofDNS is standard on NAT network mode. This is fine. The client thus receives an IP address from the Packet Squirrel. The client first performs a DNS lookup at the Packet Squirrel and the Packet Squirrel routes it to the Spoofed IP if the requested DNS name is on the spoof list. If the name does not appear on the spoof list, I assume that the Packet Squirrel routes the client traffic through the company's DNS server. But I do not think that is the case because the internal resources are no longer available. Which DNS server does the Packet Squirrel use? And is there a fix so that internal resources can be reached. I have already tried to change the network mode to BRIDGE. Then internal resources can be reached again but logically the spoofing does not work because the client make the DNS request at the company DNS server and not at the Packet Squirrel anymore. I am very curious how this works. Hopefully you can help me? Thank you! Sincerely, Jarno
I have a pineapple tetra and am currently interning with an I.T. admin. We decided to see how the Cisco AP's would react to the tetra. I booted up Kali and the pineapple on my laptop (which was connected to the guest network) and immediately, the admin received texts and emails that a rogue AP had been detected. When I tried to deauth the AP's for the guest network, they blocked it and sent another email saying the attacks were "contained." As I come to understand wireless networks, I assume being on the guest wifi helped detect the tetra, but I also assume that a wifi adapter in monitor mode could pick up devices without the Cisco AP's flagging it... The goal is to get to the hidden wlan- pineapple or not, any suggestions would be great for accessing the wlan. Cheers