Jump to content

Search the Community

Showing results for tags 'ssl'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

  1. SSLsplit + Module Working on the latest firmware > v2.5.4 Package / IPK (For advanced users): You can now find SSLSplit v0.5.5 on my github repo. 😉 It's been compiled for the latest firmwares, and is working flawlessly for me, on both my Nano and Tetra! 🙂 Manual installation of the package is for advanced users. The Module: I've also created a fork of the original SSLsplit Module, that you can find on a separate github. repo: https://github.com/adde88/SSLsplitNG It's been modified to install my package, and should work on firmware versions > 2.6.0 Module Instal
  2. Hi, When I want to execute hostapd-wpe on Wifi Pineapple I don't have problems, but when someone connects to the AP, it appears the following error: Using interface wlan1 with hwaddr 00:13:37:a7:11:80 and ssid "AcrylicWiFi-bgn" wlan1: interface state UNINITIALIZED->ENABLED wlan1: AP-ENABLED wlan1: STA 10:b1:f8:ae:c0:4b IEEE 802.11: authenticated wlan1: STA 10:b1:f8:ae:c0:4b IEEE 802.11: associated (aid 1) wlan1: CTRL-EVENT-EAP-STARTED 10:b1:f8:ae:c0:4b wlan1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=1 wlan1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25 SSL: TLS processin
  3. Hello Can someone please help me to install ssl strip. On the packet squirrel Thanks
  4. I want to use Charles/Fiddler to capture HTTPS traffic from application. After installing trusted root certificate I've noticed that not every application will accept it. For example, I can intercept all requests made by Chrome, but on Firefox I need to add trusted certificate. When capturing traffic for Java application, certificate need to be added to JVM TrustStore, and in case of using Python script we need to add line of code that use exported certificate. How can I analyze requests made by some software that support proxy (so reverse proxy can be easily used), but
  5. Hello Group, I figure I'd ask this question here and see what kind of response is put fourth. TIA Security is always on my mind and creating many embedded devices using Linux (custom builds) are some of the things I do and want to be security minded. Most small IoT device have some sort of setup, monitoring and configuration via a HTTP server. I would like to use HTTPS (SSL or TLS). It seems that I'll need a cert for each device for https in order it to function as needed. Q1: Do I really need a separate cert for each device? Q2: What happens with a https server in a air-ga
  6. Hi, I am looking on the TETRA module and thinking about to buy it. I want to deploy it without connection to a computer running on battery pack. First i have a couple of questions, is there any way to get IMAP/POP SSL credentials if the target uses client on phone or desktop? Is it working to use a PineAP module or is it protected by HSTS? My idea is to use Karma to get targeted clients in and let them surf through my stick in the TETRA If pop/imap is not protected with HSTS i would like to filter only imap/pop ssl traffic and strip that and let https c
  7. Hello everyone. I'm new here. I watch the Youtube channel from time to time and I decided to get an account with the forums due to how recent SSL threads were on this board. I'm still a bit new to this. Most of my knowledge comes from a series of tutorials but it's starting to come together. Anyways, Google isn't turning up answers for my concern but then I remember that a lot of the threads I was reading were outdated. To my understanding, SSL strip used to work but the invention of HSTS prevented that. Yet things like "Bettercap and SSLStrip2 should work"-Forum posters: 1 year ago. Keep in m
  8. Can we bypassing HSTS by using this MITM technique? The attack works on latest versions of iOS including iOS 8.1.1 and On most Android devices. Source: https://blog.zimperium.com/doubledirect-zimperium-discovers-full-duplex-icmp-redirect-attacks-in-the-wild/
  9. I've created a payload in C# that appears as a legitimate application but grants an attacker admin remote shell access on a windows system. My primary focus now it to encrypt the network traffic as best as I can for obvious reasons. I haven't done this before so I would like some guidance on how it should be done. I've done some research and come across two methods, AES using RSA to encrypt the key and SSL. I'm worried that the SSL method could easily be attacked with SSL-Strip since there is no HSTS-like implementation to prevent it. I know how to start with AES in C# as the System.Secur
  10. Hello all, I recently attempting upgrading my Mark V to SSL. I followed the (mubix) instructions here: https://github.com/hak5/wifipineapple-wiki/blob/gh-pages/add_ssl.md as well as the (4nzx) instructions here: http://4nzx.blogspot.com/2015/05/so-you-bought-new-wifi-pineapple-markv.html However, I am receiving "sec_error_bad_signature" whenever I try to access the pineapple through https. I searched the forums and came across this: https://forums.hak5.org/index.php?/topic/33395-changing-pineapple-interface-to-ssl/ But it was no help. Any suggestions? Has anyone encountered this same
  11. hiii i have make some fake pages for known pages like Facebook etc i have also install dnsmasq in Kali and setup Apache server and every thing is okay now when the victim visit Facebook in chrome for example it will told him that this is unsecured cuz of https is there any way or tools in Kali to avoid that or any other thing would be greet thanks :)
  12. Hi All, Proud new owner of a Pineapple mk V here but fairly new user. I'm trying to test a network which is 'Open' and redirects any connected users to a captive portal (requiring AD logins). I'm wondering if it would be possible to perform an attack that does the following: wlan0 broadcasts 'TARGET_SSID' as Open with the same spoofed MAC address/ESSID etc Wlan1 connects to the 'legitimate' 'TARGET_SSID' and connects to the captive portal page When a user connects to the fake TARGET_SSID on wlan0 they should see a SSL-stripped version of the captive portal. Ideally, Once they login, the
  13. Hey guys, Just got my Mark V and I definitely have watched a ton of tutorials. My question is does the SSL strip feature even work? When I connect a client to the Pineapple AP on Chrome and Mozilla it don't budge every connection stays htttps:\\ On Internet Explorer some connections do change to http:\\ but Facebook won't even load and some connections take decades to load? If you guys can help me out, because in all the youtube tutorials it seems that even mozilla loads so seemless. Or is it that chrome, mozilla fight against SSL strip attacks. I was looking so forward to getting it, b
  14. Hi I was always able to do a mitm attack targetting a specific IP and using sslstrip, ettercap, arpspoof, ... But today I tried (for the first time) to do the whole network at once and it was like sslstrip wasn't doing anything. No errors whatsoever and yet all I could see was the usual "sslstrip 0.9 by Moxie Marlinspike" and then nothing. When I target one computer I usually do something like: echo 1 > /proc/sys/net/ipv4/ip_forward iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-ports 10000 sslstrip -a -k -f arpspoof -i wlan0 -t <targetIP> -r <gat
  15. After reading a good bit about sslstip, hsts and how hsts prevents sslstrip attacks, I am intrigued to know if mobile apps send and receive data over a secure https hsts connection. And if https with the hsts implementation is exploitable. So how would I go about seeing if for example, an app like facebook (because the facebook site implements hsts) uses hsts. Which tools would i need and what would i be looking for? Secondly are there any known hsts exploits in existence?, sorry if these are all nubish questions but I'm friarly knew to this whole area, links/reading material would be apprec
  16. Hello, I attempted to follow the guide that allows you to use SSL with the Pineapple. I beleive I have followed the steps and generated everything correctly, however even with importing the ca.pem file into my brower (I have tried this with IE, Chrome, and Firefox) I still receive an SSL error that will not allow me to continue on to the web interface. The error I receive in Firefox is sec_error_bad_signature. Google has not yielded any fruitful results related to this particular setup. Any help would be greatly appreciated.
  17. Hi guys, On my blog I wrote a post about MitM attack using SSLStrip + arpspoof. It's in Italian so I don't know if u can undestand: http://www.gianlucaghettini.net/intercettazione-traffico-https-e-recupero-dati-sensibili/ Other than the actual attack (which is very well known) I focused on the HSTS policy and how it is useful to prevent such attacks. Do you known any successful attempt to break such security policy? Poisoning the DNS cache of the target host could lead to a scenario in which the target browser goes to a fake domain, receive a forged HTTP header with a max-age value of ze
  18. Hey guys, Sorry if i put this in the wrong category. I'm trying to use ssl strip + arp spoofing. I do exact the same like on every tutorial. But once everything is done, my victim has no internet. He can't load the page! If i just arp spoof my target, use something like urlsnarf. Everything works fine... Can someone please help me, i'm searching a while for a solution. By the way, sorry for my bad english. :(
  19. Hey guys, Cloudflare has made a challenge!!! So you can legaly try and steal the sll key from there challenge server. More info: https://www.cloudflarechallenge.com/heartbleed
  20. Hey guys, Just working with sslstrip on my pineapple and just got resource error. Makes sense since the pineapple does not have a whole lot of internal storage. I uninstalled it and then reinstalled on SD card and that seemed to fix it. Just curious if this was the only way of doing it or is there a way of selecting where to store the dump file? Should I reinstall tcpdump on the SD card to avoid running out of room too? Just curious if this is the only way.
  21. Hey guys! I am having a problem with running ssl strip. I am currently running the 3.0 firmware for the mark IV. I installed ssl strip into an external usb storage and I am able to run it,but it does not show any output. I have the infusion too,same thing. SOMETIMES it outputs information,I guess when it decides to run. It's not from the infusion I am sure,SSH-ing in and running ssl strip doesn't give any results either. Just a few hours ago it ran just fine for 5 minutes,I went to 3 different websites,logged in etc (one of them is facebook) and it was alright. And suddenly,it just stopped wor
  22. Hey guys, I've just covered HTTP Strict Transport Security (HSTS) and how it helps to improve web security. Any feedback on the blog or input anyone has would be much welcomed. Check it out here: http://scotthel.me/hsts Scott.
  23. Hi ! Since sslstrip is now working, I made a module for it Features - sslstrip log history - iptables rules automatically installed - start/stop sslstrip from ui Screenshots
  24. Hello! Does anyone know how can the NSA spy on https traffic? As far as I know (Please correct me if I'm wrong), a SSL certificate has a public key, a private key and the issuer has a MASTER key? And that key is used by the NSA to listen to https traffic? What about a https connection without a 'certified' SSL certificate? When my server generates it, it only has a pair of keys, no MASTER key..... Does this mean that this type of a https connection is safer then one with a Verisign issues certificate? Why does Darren keep saying that https is not that secure, and a VPN is more secure.. on
  25. Hi All, Scenario/Background: I'm on a boat. We use VSAT + two year old Cisco router. Router has been locked down. The only ports open are 80 (http), 443 (https), 25 (mail), 3389 (RDP). When travelling I used to be able to use OpenVPN (udp), PPTP VPN (tcp), or a socksified (-D) SSH connection to tunnel my traffic. That's no longer the case. I borked my VPS server trying to get around the above stated issue. It's left me in a bit of a pickle. I can use TOR to get to my VPS's CPANEL (control panel). I have to use a service like TOR, because the CPANEL is on a non-standard web port (5454). I
×
×
  • Create New...