Jump to content

Search the Community

Showing results for tags 'tcpdump'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 13 results

  1. Hello, I would appriciate help running the squirrel TCPDUMP payload in CLONE mode packet squirrel version the squirrel is running on: 3.2 Downloaded payload from github: packetsquirrel-payloads/payloads/library/sniffing/tcpdump/payload.sh When running the script in TRANSPARENT mode it runs OK. When changing the mode to CLONE - can not have network connection. Thx
  2. Hey guys, I have a packet squirrel setup in Cloud2 and I can successfully start a terminal session. In a terminal session I would like to run a packet capture. If I run the command tcpdump -nni eth1 -f /mnt/loot/tcpdump/test2.pcap I am able to capture some packets. I can Exfil the packet capture with the command: C2EXFIL /mnt/loot/tcpdump/test2.pcap and the file shows up in the C2 dashboard. However, when I download the pcap, Wireshark cannot open it. I get an error message: "The file test2.pcap isn't a capture file in a format that Wireshark understands" Screenshot: https:
  3. Module: tcpdump Version: 1.4 Features: Manage dependencies Configure tcpdump options and filters Dump History Change log: 1.4 Bug fixes
  4. Has anybody been able to mitm a printer which was using a (windows) print server? I tried running default payload 1: tcpdump to sniff traffic going to a printer. I read the payload and saw it put the PS into transparent netmode. Hookup: [printer] --CAT5--> in-[PS]-out --CAT5--> [wall-jack-to-switch] The printer is hardcoded to a specific IPv4 address and uses a print server for spooling. Whenever the PS is placed inline, all systems & print-server say the printer is no longer reachable. Confirmed by pinging the hardcoded IP of printer that it is not reachable.
  5. Hi, I installed the module tcpdump on my sd card. When I click on start, nothing happens. How can I resolve that bug? I really don t understand. thanks a lot
  6. When i start the PS the capture isnt working, its blinking red, green, blue when attempting to start tcpdump payload and dont get internet access on computer. SSH to device works.
  7. I'm sniffing using: tcpdump -i wlan0 -e I'm not receiving any information about what channel or frequency is used. Is this normal for these nics? I've tried to change the channel using ifconfig but to no change. On my laptop i get information like: "6.0 Mb/s 5180 MHz 11a". 12:55:36.413325 8361052374567211200us tsft cfp 0.0 Mb/s 0 MHz Turbo -128dB signal [bit 29] BSSID:ff:ff:ff:ff:ff:ff DA:ff:ff:ff:ff:ff:ff
  8. Hello everyone. I want to know whether there is a way to triangulate data from wifi pineapples kept at various locations. I have 2 wifi pineapples and will be using tcpdump to store data. So is there a way to obtain the complete data in one particular file which makes it easy to access it.
  9. Thanks to Hak5 for bring the Mark V to the masses--would like to see more examples of various hacks thus I assume this is what the forums are for so, here are some questions. I went to the link below and thinks its a good tutorial but think the person left out a bunch of Stuff and has it wrong on the whole Whitelist thing they mentioned in the guide--I think they met to say you need to black list----- file:///home/q/Downloads/Phishing%20for%20Facebook%20logins%20with%20the%20WiFi%20Pineapple%20Mark%20V%20from%20HAK5%20%28Setup%20Guide%29%20|%20.%20.%20TheSecurityBlogger%20.%20.%20..html ==
  10. Hey there folks.. Just got the pineapple fired up and capturing using a honeypot... Any ideas how i write the output of tcpdump to the mounted SD card in the unit?
  11. i ssh into pineapple tried installing nmap this is what i get root@Pineapple:~# opkg update Downloading http://cloud.wifipineapple.com/packages/Packages.gz. Updated list of available packages in /var/opkg-lists/snapshots. root@Pineapple:~# opkg install --dest usb nmap Unknown package 'nmap'. Collected errors: * opkg_install_cmd: Cannot install package nmap. i'm on v2.7.7 i tried installing through browser ui without success. i'm new to this plz help
  12. Is possible to run sslstrip on bridge interface or only over NAT ? like on pic. I want to decode https data on the fly in network between WiFi Router & ISP without accessing in local network & changing ip addresses
  13. Hello! Can anyone help me to solve problem with multiple interfaces sniffing on wifi pineapple m4 ? I want cut in into ethernet cable to sniff RX/TX data over eth0 & eth1 interfaces & write it to dump on flashdrive but when i run : tcpdump -vv -i eth0 -i eth1 -w /usb/dump.cap [/CODE] I've only capture eth0 or eth1 interface when i conected via wireless interface & run : [CODE] brctl addbr sniff brctl delif sniff eth0 brctl addif sniff eth0 brctl addif sniff eth1 tcpdump -vv -i sniff -w /usb/dump.cap [/CODE] I've capture data from bottom interfaces but cannot connect to ssh or
×
×
  • Create New...