Jump to content

Search the Community

Showing results for tags 'wifi'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • WiFi Pineapple
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Gear
    • Hak5 Cloud C²
    • Plunder Bug
    • Bash Bunny
    • Signal Owl
    • USB Rubber Ducky
    • Packet Squirrel
    • LAN Turtle
    • Screen Crab
    • Shark Jack
    • Key Croc
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 94 results

  1. Hi! We're pleased to announce a new release for the WiFi Pineapple NANO: 2.7.0. This update addresses some of the bugs reported by the great community here on the forums and in the Hak5 Discord, as well as updates to some community packages and updates to OpenWRT. 2.7.0 Changelog: General OpenWRT version is now 19.07.2. Kernel has been updated from 4.14.133 to 4.14.171. Fixed an issue where OpenVPN would cause a kernel panic upon establishing tunnel. Recon Fixed an issue where live scans would fail on the WiFi Pineapple TETRA. Reporting Fixed an issue where emails would not be sent. Improved the user experience by automatically saving email settings when testing emails. Improved the user experience by forcing an email to send when testing, regardless of whether the "Send Email" option was checked. Advanced Fixed an issue where swap would not be mounted automatically on the NANO's SD Card. Renamed "USB" panel to "USB & Storage". Misc Added SSLSplit package to repositories. This fixes the SSLSplit module dependencies. Updated Kismet package in repositories. Updated Kismet-RemoteCap package in repositories. You can update your WiFi Pineapple NANO Over-The-Air via the Advanced module or manually at the Hak5 Download Center. ♥ - The Hak5 Development Team
  2. Hello, I have a problem with my nano when I log in to a connection with my iPhone my nano becomes a client and has no internet access... a solution? thank un
  3. Hi Guys, I seem to be having a bit of difficulty getting the screen crab to connect to WiFi. I have my C2 server on my local network and am attempting to connect to my local wireless AP. Here's what I've done to troubleshoot so far. I've looked through the debug output, and as far as I can tell, it confirms a lack of connection to C2. Util: exec [stop adbd]|Util: stop adbd shell exited value: 0|Util: exec [stop logd]|Util: stop logd shell exited value: 0|Util: exec [source system/bin/crab && upgrade_check_on_boot]|Util: Service start shell exited value: 0|Util: exec [source /system/bin/crab && do_gpio_setup && leds_off]|Util: RunThread shell exited value: 0|Util: exec [source /system/bin/crab && upgrade_framework 1.0.6]|Mirror: NEW HDMI Status; Input: true|Mirror: HDMI INSERTED|Util: crabframeworkupgrade shell exited value: 0|CrabFramework: Crab framework up to date|Util: exec [source /system/bin/crab && red]|ShellThread: setCPU Shell Thread Starting|Util: exec [source /system/bin/crab, source /system/bin/crab && sleep 120 && do_cpu_setup]|Mirror: camera opened 1920 x 1080|Util: Main setLEDsNow() shell exited value: 0|Util: exec [source /system/bin/crab && wait_for_sd_location]|Mirror: SETTING UP PREVIEW|Util: waitforSD shell exited value: 0| Util: exec [source /system/bin/crab && led_off]|Util: Main setLEDsNow() shell exited value: 0|DeviceConfig: C2 Device.config PARSE COMPLETE|RunThread: C2 ENABLED|RunThread: CREATING C2 THREAD|RunThread: Loading Crab Config from SD|Util: exec [source /system/bin/crab && locate_sd && touch /storage/AC93-4313/version.txt && echo 1.0.6 > /storage/AC93-4313/version.txt]|Util: versionfile shell exited value: 0|CrabConfig: CONFIG OPTION WIFI_SSID|CrabConfig: CONFIG ARG SkinnyRD|CrabConfig: CONFIG OPTION WIFI_PASS|CrabConfig: CONFIG ARG |CrabConfig: CONFIG OPTION DEBUG_LOG|CrabConfig: CONFIG ARG ON|CrabConfig: DEBUG LOG CONFIG OPTION SET TO: ON| CrabConfig: WIFI CONFIGURED|Util: exec [source /system/bin/crab && diff_config_enable_wifi SkinnyRD ]|Util: psk wifi config shell exited value: 0|CrabConfig: WiFi configured successfully|SDREADER: NO FILE AT PATH|SDWatch: SD Watch Thread Starting|Util: exec [source /system/bin/crab, watch_sd_location]|ButtonListener: Button Listener Thread Starting|Util: exec [source /system/bin/crab, wait_for_button_press]| RunThread: STARTING C2 THREAD|LEDRunner: LED Runner Thread Starting|Util: exec [source /system/bin/crab, led_off]|C2Run: C2 Thread started|C2Run: C2 notification added to device queue: Capture Starting|Util: LEDRunner shell exited value: 0|C2Run: C2 Update crab config called|C2Device: C2 FLAG SEND UPDATED STATE|C2Run: C2 Waiting for capture thread to start|RunThread: STARTING NEW CAPTURE THREAD|CaptureThread: CAPTURE THREAD START|CaptureThread: Signal Check request sent|Mirror: REQUEST RECEIVED|Mirror: INTENT SIGNAL CHECK check|Mirror: Response sent:SIGNAL|CaptureThread: Response:SIGNAL|CaptureThread: CRAB HAS VIDEO SIGNAL|C2Run: C2 Update crab config called|CaptureThread: STARTING IMAGE CAPTURE|Util: exec [source /system/bin/crab && get_current_temp]|Util: tempcheckexit value: 0| Util: tempcheckshell output : 65228|CaptureThread: CURRENT TEMP: 65228|CaptureThread: 21908 captures avail|Util: exec [source /system/bin/crab && get_next_capture]|Util: GetNextCapexit value: 0|Util: GetNextCapshell output : /storage/AC93-4313/LOOT/2|CaptureThread: Capture Request Sent/storage/AC93-4313/LOOT/2.jpg|Mirror: REQUEST RECEIVED|Mirror: WAITING FOR CAPTURE TO COMPLETE|Util: exec [source /system/bin/crab, blue]|Util: LEDRunner shell exited value: 0| Mirror: WRITING CAPTURE TO SD|Mirror: CAPTURE COMPLETE597ms|Mirror: Response sent:/storage/AC93-4313/LOOT/2.jpg|CaptureThread: Response:/storage/AC93-4313/LOOT/2.jpg|Util: exec [source /system/bin/crab && has_signal_log]|Util: NoSignalLog shell exited value: 0|CaptureThread: capture interval 5000ms|CaptureThread: Time spent capturing 749ms|CaptureThread: Capture sleep 4251ms|CaptureThread: 21907 captures avail|Util: exec [source /system/bin/crab && get_next_capture]|Util: GetNextCapexit value: 0|Util: GetNextCapshell output : /storage/AC93-4313/LOOT/3| CaptureThread: Capture Request Sent/storage/AC93-4313/LOOT/3.jpg|Mirror: REQUEST RECEIVED|Mirror: WAITING FOR CAPTURE TO COMPLETE|Mirror: WRITING CAPTURE TO SD|Mirror: CAPTURE COMPLETE599ms|Mirror: Response sent:/storage/AC93-4313/LOOT/3.jpg|CaptureThread: Response:/storage/AC93-4313/LOOT/3.jpg| Util: exec [source /system/bin/crab && has_signal_log]|Util: NoSignalLog shell exited value: 0|CaptureThread: capture interval 5000ms|CaptureThread: Time spent capturing 749ms|CaptureThread: Capture sleep 4251ms|C2Run: C2 Thread starting|C2Device: C2 STARTUP SYNC|Util: exec [cat /proc/uptime | busybox awk {print ;} 2>/dev/null]|Util: C2DeviceUpdateexit value: 0|Util: C2DeviceUpdateshell output : 44.07|Util: exec [cat /sys/class/net/wlan0/statistics/rx_bytes]|Util: C2DeviceUpdateexit value: 0|Util: C2DeviceUpdateshell output : 0|Util: exec [cat /sys/class/net/wlan0/statistics/tx_bytes]|CaptureThread: 21906 captures avail|Util: exec [source /system/bin/crab && get_next_capture]|Util: C2DeviceUpdateexit value: 0|Util: C2DeviceUpdateshell output : 0|Util: exec [ifconfig wlan0 | grep inet addr | cut -d: -f2 | busybox awk {print ;}]| Util: C2DeviceUpdateexit value: 0|Util: C2DeviceUpdateshell output : |C2Run: C2 error error getting updated ip|C2Device: SEND C2 UPTIME|C2Device: SEND C2 MINIMAL|C2Device: SEND C2 NOTIFICATIONS|Util: GetNextCapexit value: 0|Util: GetNextCapshell output : /storage/AC93-4313/LOOT/4|CaptureThread: Capture Request Sent/storage/AC93-4313/LOOT/4.jpg|Mirror: REQUEST RECEIVED|Mirror: WAITING FOR CAPTURE TO COMPLETE|POST: C2 POST ERROR: java.net.ConnectException: failed to connect to /172.16.0.18 (port 8080): connect failed: ENETUNREACH (Network is unreachable)|C2Run: C2 error startup sync post failed|C2Run: C2 RETRYING STARTUP SYNC|Mirror: WRITING CAPTURE TO SD|Mirror: CAPTURE COMPLETE604ms|Mirror: Response sent:/storage/AC93-4313/LOOT/4.jpg|CaptureThread: Response:/storage/AC93-4313/LOOT/4.jpg|Util: exec [source /system/bin/crab && has_signal_log]|Util: NoSignalLog shell exited value: 0|CaptureThread: capture interval 5000ms| I've made a wireless capture, but without knowing what the MAC address OUI for the screen crab is, it does me no good as there is a ton of wireless traffic in the area. I've checked and double checked to make sure the config file is correct. The only thing in the config file is WIFI_SSID XxxxxxXxxX WIFI_PASS XxxxXXxXXxx DEBUG_LOG ON I have confirmed I can reach the C2 server over 8080 from both the wired and wireless side of my network. I've also deleted the device from Cloud C2, made another device, and re-downloaded the device.config file. Any suggestions? Thanks for any help you can provide!
  4. Hi! We're pleased to announce a new release for the WiFi Pineapple TETRA: 2.7.0. This update addresses some of the bugs reported by the great community here on the forums and in the Hak5 Discord, as well as updates to some community packages and updates to OpenWRT. 2.7.0 Changelog: General OpenWRT version is now 19.07.2. Kernel has been updated from 4.14.133 to 4.14.171. Fixed an issue where OpenVPN would cause a kernel panic upon establishing tunnel. Recon Fixed an issue where live scans would fail on the WiFi Pineapple TETRA. Reporting Fixed an issue where emails would not be sent. Improved the user experience by automatically saving email settings when testing emails. Improved the user experience by forcing an email to send when testing, regardless of whether the "Send Email" option was checked. Advanced Fixed an issue where swap would not be mounted automatically on the NANO's SD Card. Renamed "USB" panel to "USB & Storage". Misc Added SSLSplit package to repositories. This fixes the SSLSplit module dependencies. Updated Kismet package in repositories. Updated Kismet-RemoteCap package in repositories. You can update your WiFi Pineapple TETRA Over-The-Air via the Advanced module or manually at the Hak5 Download Center. ♥ - The Hak5 Development Team
  5. Hey guys I am pretty new here in this forums guys my problem is that I using aircrack-ng method to get handhake but I am not getting it . I am doing everything correct with no error but time goes by . not getting any handshakes and I am sending infinty deauth packets to the victims but then also i did not get handshake and a client is there and by the way if I try the attack on my own network I get the handshakes in minutes. Please help me
  6. Please post general comments here so we can have one place to answer the common questions.
  7. What can be other use of Pineapple in daily life (w/ Pineapple firmware!), not just for pen testing. My initial setup also has Alfa awus036nha. Can it be used as Wifi signal booster; connects to wifi with awus036nha and you can connect to internet through AP121U LAN; other (name them). I presume, if you don't have stock firmware, which came with AP121U then you are stuck with Pineapple for life?
  8. maskgirl

    wifi cracking

    Do we neeed external wireless wifi adapter for performing deauthentication attack?
  9. I've no idea whats happening here. I bough the AWUS036ACH wifi adapter. It sports the RealTek 8812AU chipset. anyways, like i said no idea, ill set the adapter to 802.11AC and prioritize 5Ghz band, run a internet speed test and get speeds like 16mbps down. Ill then set it to 802.11 a/n also prioritize 5Ghz band and get 66 mbps download. What the actual fuck? Whats even weirder is when i view my adapter through windows it shows 300mbps when using 802.11 n and like 620 for 802.11 AC. (Yes im aware my isp has bandwidth limits and i know i cant expect to achieve those speeds that my devices are capable of because of ISP bottle necking. And its not the router hardware limitation my router is a Archer A7 TPlink 1750AC.) Whats confusing me is why when i use 802.11 a/n im hauling ass. but when i use 802.11 AC im getting significantly less download speed? I dont know exactly where to look anymore. AC has just been SUPER finicky. It'll pop in a out of connectivity. ill have to disable and re-enable to get it to work, but even if i get it to maintain connection the speeds stay in that 16 mbps range. I dont understand i dont have enough knowledge to figure it out by myself please someone give me some guidance here. I've tried multiple drivers, with this chipset the ones from ALFA the ones from RealTek, the default windows ones, im just at a complete loss. it feels like something is bottle necking the 802.11AC protocol and i have no idea how to figure out where or why. And before someone suggests it im gonna hop on the router and see if i can update the firmware or something. but if anyone has any other suggestions or ideas please let me know. thanks
  10. Eric69

    Mac

    Anyone have experience hooking up a wifi pineapple to a macbook pro, can it be done, and how so?
  11. I'm trying to run wifislax on limbo for Android and it is installed successfully but it doesn't run .when installation is done I just get this black screen in attachments.any help?thanks My phone is redmi note 8 pro with mediatech core and 6 GB of ram,limbo version is 4.1.0 And the most recent wifislax version from their website
  12. Hi! We're very excited to announce the release of the 2.6.x Firmware for the WiFi Pineapple TETRA! We've been working hard behind the scenes, listening to the great community feedback and building upon it to iron out reported bugs, add new features and bring updates to everyone's favourite fruity wireless device. Whether it's the updated kernel, fresh packages or improvements to PineAP and Recon - there's something in this firmware for you. 2.6.2 Changelog: PineAP Fix an issue where handshake captures might fail after a timed, non-live scan. Fix an issue where starting a handshake capture when a scan is not running would result in incorrect channel hopping behaviour. Misc Work around a kernel bug causing packet filtering to fail in some tools. Thank you @adde88! 2.6.1 Changelog: General Fix an issue affecting the microSD card on some WiFi Pineapple NANOs. Fix an issue where external USB WiFi adapters would register before internal interfaces. Module Manager Dialogs are now used for Module installation and updating. Add a message about third-party modules before installation. Misc Added missing kernel modules to the Hak5 Package Repositories. 2.6.0 Changelog: General Update firmware base from OpenWRT 15.05 to OpenWRT 19.07. Update kernel from 3.18.84 to 4.14.133. Ensure all opkg feeds are HTTPS. Update PHP5 to PHP7. Update HostAPd from 2.6 to 2.7. Improve SD Card stability on the WiFi Pineapple NANO. Include support for the MediaTek MT76x2 wireless chipsets. Dashboard Fix an issue where the "SSIDs collected this session" counter wouldn't reset after a reboot. Use more reliable method of obtaining CPU usage. PineAP Fix a rare crash due to memory corruption. Fix an issue where PineAP options would unselect if PineAP was disabled. Fix an issue where PineAP Enterprise would not work if Management AP was disabled. Improve beacon effectiveness by rotating through SSID Pool. Greatly improve memory and CPU consumption. Fix an issue where Raw Frame Injection might hang indefinitely. Add an option to reset the 'SSIDs collected this session' counter on the Dashboard. Recon Ensure that previous scan dates are displayed correctly. Networking Improve Client Mode reliability. Configuration Fix an issue where the user configured timezone would not set correctly. Advanced Fix an issue where the SD Card format may hang indefinitely. Misc Update Cloud C2 Client. Packages Add Kismet Package. Add Kismet Remote Capture Package. Updates to a huge variety of commonly used packages. A special thank you to the community members who provided excellent beta feedback: - adde88 - dragorn - Just_A_User ♥ - The Hak5 Development Team
  13. Hi! We're very excited to announce the release of the 2.6.x Firmware for the WiFi Pineapple NANO! We've been working hard behind the scenes, listening to the great community feedback and building upon it to iron out reported bugs, add new features and bring updates to everyone's favourite fruity wireless device. Whether it's the updated kernel, fresh packages or improvements to PineAP and Recon - there's something in this firmware for you. 2.6.2 Changelog: PineAP Fix an issue where handshake captures might fail after a timed, non-live scan. Fix an issue where starting a handshake capture when a scan is not running would result in incorrect channel hopping behaviour. Misc Work around a kernel bug causing packet filtering to fail in some tools. Thank you @adde88! 2.6.1 Changelog: General Fix an issue affecting the microSD card on some WiFi Pineapple NANOs. Fix an issue where external USB WiFi adapters would register before internal interfaces. Module Manager Dialogs are now used for Module installation and updating. Add a message about third-party modules before installation. Misc Added missing kernel modules to the Hak5 Package Repositories. 2.6.0 Changelog: General Update firmware base from OpenWRT 15.05 to OpenWRT 19.07. Update kernel from 3.18.84 to 4.14.133. Ensure all opkg feeds are HTTPS. Update PHP5 to PHP7. Update HostAPd from 2.6 to 2.7. Improve SD Card stability on the WiFi Pineapple NANO. Include support for the MediaTek MT76x2 wireless chipsets. Dashboard Fix an issue where the "SSIDs collected this session" counter wouldn't reset after a reboot. Use more reliable method of obtaining CPU usage. PineAP Fix a rare crash due to memory corruption. Fix an issue where PineAP options would unselect if PineAP was disabled. Fix an issue where PineAP Enterprise would not work if Management AP was disabled. Improve beacon effectiveness by rotating through SSID Pool. Greatly improve memory and CPU consumption. Fix an issue where Raw Frame Injection might hang indefinitely. Add an option to reset the 'SSIDs collected this session' counter on the Dashboard. Recon Ensure that previous scan dates are displayed correctly. Networking Improve Client Mode reliability. Configuration Fix an issue where the user configured timezone would not set correctly. Advanced Fix an issue where the SD Card format may hang indefinitely. Misc Update Cloud C2 Client. Packages Add Kismet Package. Add Kismet Remote Capture Package. Updates to a huge variety of commonly used packages. A special thank you to the community members who provided excellent beta feedback: - adde88 - dragorn - Just_A_User As usual, catch the update via OTA in the WiFi Pineapple Web Interface or grab it the Hak5 Download Portal. ♥ - The Hak5 Development Team
  14. Hi, When I want to execute hostapd-wpe on Wifi Pineapple I don't have problems, but when someone connects to the AP, it appears the following error: Using interface wlan1 with hwaddr 00:13:37:a7:11:80 and ssid "AcrylicWiFi-bgn" wlan1: interface state UNINITIALIZED->ENABLED wlan1: AP-ENABLED wlan1: STA 10:b1:f8:ae:c0:4b IEEE 802.11: authenticated wlan1: STA 10:b1:f8:ae:c0:4b IEEE 802.11: associated (aid 1) wlan1: CTRL-EVENT-EAP-STARTED 10:b1:f8:ae:c0:4b wlan1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=1 wlan1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25 SSL: TLS processing failed I use default configuration. How can I fix this problem? Thx!
  15. Hello I am an IS auditor and I need to perform an IT audit of a network in a large complex far outside a metropolitan aera . One key point of the audit is to be able to identify all Wifi Access Points in te complex. My customer wants to be sure that only the one that he has autorized are installed. So I will be during 3 days at various intervals walking through the facility to cover the all perimeter. I have just order a wifi pineapple nano and I would like to use it to have the following information (that will allow me to identify rogue AP) SSID Security (WPA/WEP/WPA2) Manufacture/Model * (This one is important so I can filter out all AP that are Cellphone from the employees) Thanks a lot for the support In addition, is there a documentation an tutorial of all I can do with my new toy/tool
  16. I was testing evil twin attack on my laptop using one wireless adapter. I ran it on airmegaddon and while I have successfully created a rogue AP, my laptop can't connect to the AP. It failed numerously. Is there a way to get connected to the AP that I have created?
  17. Ok, so a while back I updated the owl and now I can't seem to get it to do anything! I'm trying to connect it to wifi, but it won't work! It goes through the boot process, then it stops blinking all together! I don't know why it won't work, I don't know how I can erase it to start over in case it was something I did trying to get it to work... when I push the button on the back, it does work to put it into arming mode. Any help would be fantastic!
  18. https://bestestredteam.com/2019/11/28/building-a-better-wifi-pineapple-with-open-source-tools/
  19. Hello everyone, I've been playing around with a freshly acquired Wifi Pineapple Tetra. I upgraded, did a few factory resets and frimware reset too I there a two problems that need to be fixed. The first one apparead with the firmware upgrade from 2.4.something to the latest 2.6.2. : The live scan results don't print. We need to do a scan, stop it and load the scan file to output the results. I have seen this issue a few times on the forums but no admin/dev here made any answer or fix. WE NEED TO FIX THIS. This feature is important for the field pentesting. The second one is linked to wlan1mon. When I enable the PineAp, wlan1 goes into monitor mode and becomes wlan1mon. When PineAP gets disabled, the reverse operation is not done, making the red LED to keep blinking even though the PineAP is stopped. Any admin or dev here could take a look at this please ?
  20. I've recently purchased a signal owl and have had some success just using the internal 2.4GHz radio. However I'd now like to step things up and use my AWUS036ACH (RTL8812AU) however I'm not sure how to set this adapter up as an interface (I'm new to OpenWRT). Currently the device shows up in lsusb as expected however it does not appear if I run ip addr or ifconfig. What's the process for setting up an adapter up in OpenWRT? Is this particular adapter supported? Do I need to install a driver? Any help would be greatly appreciated :)
  21. The HCX Pi is based off ZerBea's hcxdumptool project: https://github.com/ZerBea/hcxdumptool Specs: Raspberry Pi 3B+ running Arch Linux Alfa AWUS036NH adapter Custom board for multiple status LEDs and control button 3D printed enclosure. The purpose of the hardware is to have a small self-contained portable tool for capturing WPA2 PMKIDs The hardware could easily be repurposed for many other applications as well (more coming soon!). LEDs are for power, ACT for Pi, and hcxdumptool status LED based off the script from github project. If there is interest in a build log please leave a reply and I will consider making one. Future improvements are a smaller case and internal battery.
  22. I have (most probably) an EPON connection providing speeds of 600/600 Mbps. However, the modem that has been supplied by my ISP is really crappy. When it works, it performs well, but once in a while it just freezes up, until it manually restarted. I talked to the technician, and he told me that my connection was EPON (had some doubts) but he was sure that the fiber line wasn’t locked to the modems from one particular brand, hence I am free to use any other modem I want. I found some really cheap ONTs on AliExpress, but all of them are GPON ones. If I buy those, will those work on my connection ? (PPPoE auth) https://www.aliexpress.com/item/32799325864.html?spm=a2g0s.8937460.0.0.62fc2e0eRhskot This is what my modem page shows :
  23. So I just got my pineapple very recently and I had a simple question. how do I forced people to connect to my network. here's an example. I'm at Starbucks and the original Starbucks Wi-Fi is running. so I created a fake Starbucks SSID for people to connect to. Is there a way to forced people to connect to my fake Starbucks instead of the original?
  24. Hi everyone, I bought a wifi pineapple about a couple of years ago. I've been searching for a battering thin enough to fit the case and be plugged using the U shaped usb connector. I know about the anker and pineapple juince models.. however, I can't find them online (shipping to belgium). Has anyone else found another battery that fits?? Thanks a lot!
  25. Hello Community, Staff: If i'm not in right section sorry and could you move it please Just few words about wi-fi .... Smartphones, tablets, laptops, raspberry pi's,arduino's,consoles, etc ..., many devices around us emit wifi. But when we analyze datas (frames) issued by all these devices, we realize that they are constantly seeking the access points(ISP box) on which they were connected, this is what the we call "Probe Requests". If you have already connected to the wifi of a mcdonald,a supermarket or in a friend's home, you will notice that each time you are near a network to which you have already been connected, and that your wifi is activated, your device will automatically connect to it without asking for a security key again. The probe requests issued by your device are automatically recognized by the access point, so you are automatically connected! Interesting so far ... and ?? And if we could get all its probe requests in real time, classify them by mac address, identify the device that emits them and even observe the power of the device to get an idea of the distance to which it is located from ourself.. and all with a device holding in your pocket !! It would be great indeed ... We could know which device connected to where, so we would have crucial information about our target, such as where she lives, what other places she connected to (hotel, coffee-shop,etc ..) and all with a lightning precision up to its exact address with a live view with street view! Prerequisites: 1 Android device / Smartphone or tablet An internet connection: 3G / 4G or WiFi 1 Micro-USB cable 1 OTG adapter Wifi of device you want to track must be activated. THAT'S ALL! For these investigations i built 2 android apps. Respectively called "AP Sniffer" and "AP Tracker". Where "AP" is Access Point. We need also a piece of cheap hardware to get the job done,a NodeMCU v3.0 module is your guy! Some arduino code to sniff and display results with AP Sniffer app. We need to connect our module with an OTG adapter as in the following image: Once plugged in,we launch the AP Sniffer app. As soon as the connection is made with your module this one will immediately sniff all the devices around you, identify them in real time thanks to their addresses mac (Apple, Samsung, etc ..), determine the power of the signal emitted and especially what are all the access points to which they have already been connected! Let's see this in detail: RSSI: Power of the signal emitted by the devices around you. Measuring in dBm, the more you climb to the -90 plus the device in question is far. Conversely, the lower you get to -50 dBm, the closer the device will be to you. To give you an idea, if the box of your home is in the room next to where you are, you will average -60 dBm. The dBm is an abbreviation of the power ratio in decibels (dB) between the measured power and a milliwatt (mW). DEVICES: You guessed it, these are the devices that surround us. Note that sometimes there may be some latency to appear devices, because the module must first wait for the probe requests so that the application can make a lookup in a text file internally. An up-to-date list of more than 23,000 manufacturers to determine which mac address matches which manufacturer. Also note that some devices issue probe requests every X minutes depending on the model ... Sometimes it can take several minutes to get all the probe requests around you! Each device is different!! You must also take into account the limit of the wifi antenna of your module! If we gain in discretion by the size of the module, we lose in signal range, do not expect to recover all the probe requests of a whole street without moving, be realistic! ACCESS POINTS: As its name implies, it is all access points to which all devices have already connected at least once. These famous probe requests transformed here into mac addresses! You can see how easy it is to see all the requests made by the devices around us. And ?? It's fine but what we do with these mac addresses ?? How do I know where the guy lives with his samsung near me ?? All sweet we come. Now you know which device you want to track, you just have to open our second app AP Tracker. Once started you just have to type the chosen mac address and press Track! I let you observe the impressive result! Now you know the exact address from where this device were connected at least one time! In addition you will have a live view with street view API and GPS coordinates! You are able to track all the probe requests of all the devices that your module will have sniffed ... you now understand the dangers... We reach the end of this story,hoping it will be useful for your own security. Cheers!
×
×
  • Create New...