Jump to content

Search the Community

Showing results for tags 'wifi'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • WiFi Pineapple
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapple University
    • WiFi Pineapples Mark I, II, III
  • Hak5 Gear
    • Hak5 Cloud C²
    • Plunder Bug
    • Bash Bunny
    • Signal Owl
    • USB Rubber Ducky
    • Packet Squirrel
    • LAN Turtle
    • Screen Crab
    • Shark Jack
  • Hak5 Shows
    • Hak5
    • HakTip
    • Metasploit Minute
    • Threatwire
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 84 results

  1. I've recently purchased a signal owl and have had some success just using the internal 2.4GHz radio. However I'd now like to step things up and use my AWUS036ACH (RTL8812AU) however I'm not sure how to set this adapter up as an interface (I'm new to OpenWRT). Currently the device shows up in lsusb as expected however it does not appear if I run ip addr or ifconfig. What's the process for setting up an adapter up in OpenWRT? Is this particular adapter supported? Do I need to install a driver? Any help would be greatly appreciated :)
  2. Hi! We're very excited to announce the release of the 2.6.x Firmware for the WiFi Pineapple TETRA! We've been working hard behind the scenes, listening to the great community feedback and building upon it to iron out reported bugs, add new features and bring updates to everyone's favourite fruity wireless device. Whether it's the updated kernel, fresh packages or improvements to PineAP and Recon - there's something in this firmware for you. 2.6.2 Changelog: PineAP Fix an issue where handshake captures might fail after a timed, non-live scan. Fix an issue where starting a handshake capture when a scan is not running would result in incorrect channel hopping behaviour. Misc Work around a kernel bug causing packet filtering to fail in some tools. Thank you @adde88! 2.6.1 Changelog: General Fix an issue affecting the microSD card on some WiFi Pineapple NANOs. Fix an issue where external USB WiFi adapters would register before internal interfaces. Module Manager Dialogs are now used for Module installation and updating. Add a message about third-party modules before installation. Misc Added missing kernel modules to the Hak5 Package Repositories. 2.6.0 Changelog: General Update firmware base from OpenWRT 15.05 to OpenWRT 19.07. Update kernel from 3.18.84 to 4.14.133. Ensure all opkg feeds are HTTPS. Update PHP5 to PHP7. Update HostAPd from 2.6 to 2.7. Improve SD Card stability on the WiFi Pineapple NANO. Include support for the MediaTek MT76x2 wireless chipsets. Dashboard Fix an issue where the "SSIDs collected this session" counter wouldn't reset after a reboot. Use more reliable method of obtaining CPU usage. PineAP Fix a rare crash due to memory corruption. Fix an issue where PineAP options would unselect if PineAP was disabled. Fix an issue where PineAP Enterprise would not work if Management AP was disabled. Improve beacon effectiveness by rotating through SSID Pool. Greatly improve memory and CPU consumption. Fix an issue where Raw Frame Injection might hang indefinitely. Add an option to reset the 'SSIDs collected this session' counter on the Dashboard. Recon Ensure that previous scan dates are displayed correctly. Networking Improve Client Mode reliability. Configuration Fix an issue where the user configured timezone would not set correctly. Advanced Fix an issue where the SD Card format may hang indefinitely. Misc Update Cloud C2 Client. Packages Add Kismet Package. Add Kismet Remote Capture Package. Updates to a huge variety of commonly used packages. A special thank you to the community members who provided excellent beta feedback: - adde88 - dragorn - Just_A_User ♥ - The Hak5 Development Team
  3. So I just got my pineapple very recently and I had a simple question. how do I forced people to connect to my network. here's an example. I'm at Starbucks and the original Starbucks Wi-Fi is running. so I created a fake Starbucks SSID for people to connect to. Is there a way to forced people to connect to my fake Starbucks instead of the original?
  4. Hi! We're very excited to announce the release of the 2.6.x Firmware for the WiFi Pineapple NANO! We've been working hard behind the scenes, listening to the great community feedback and building upon it to iron out reported bugs, add new features and bring updates to everyone's favourite fruity wireless device. Whether it's the updated kernel, fresh packages or improvements to PineAP and Recon - there's something in this firmware for you. 2.6.2 Changelog: PineAP Fix an issue where handshake captures might fail after a timed, non-live scan. Fix an issue where starting a handshake capture when a scan is not running would result in incorrect channel hopping behaviour. Misc Work around a kernel bug causing packet filtering to fail in some tools. Thank you @adde88! 2.6.1 Changelog: General Fix an issue affecting the microSD card on some WiFi Pineapple NANOs. Fix an issue where external USB WiFi adapters would register before internal interfaces. Module Manager Dialogs are now used for Module installation and updating. Add a message about third-party modules before installation. Misc Added missing kernel modules to the Hak5 Package Repositories. 2.6.0 Changelog: General Update firmware base from OpenWRT 15.05 to OpenWRT 19.07. Update kernel from 3.18.84 to 4.14.133. Ensure all opkg feeds are HTTPS. Update PHP5 to PHP7. Update HostAPd from 2.6 to 2.7. Improve SD Card stability on the WiFi Pineapple NANO. Include support for the MediaTek MT76x2 wireless chipsets. Dashboard Fix an issue where the "SSIDs collected this session" counter wouldn't reset after a reboot. Use more reliable method of obtaining CPU usage. PineAP Fix a rare crash due to memory corruption. Fix an issue where PineAP options would unselect if PineAP was disabled. Fix an issue where PineAP Enterprise would not work if Management AP was disabled. Improve beacon effectiveness by rotating through SSID Pool. Greatly improve memory and CPU consumption. Fix an issue where Raw Frame Injection might hang indefinitely. Add an option to reset the 'SSIDs collected this session' counter on the Dashboard. Recon Ensure that previous scan dates are displayed correctly. Networking Improve Client Mode reliability. Configuration Fix an issue where the user configured timezone would not set correctly. Advanced Fix an issue where the SD Card format may hang indefinitely. Misc Update Cloud C2 Client. Packages Add Kismet Package. Add Kismet Remote Capture Package. Updates to a huge variety of commonly used packages. A special thank you to the community members who provided excellent beta feedback: - adde88 - dragorn - Just_A_User As usual, catch the update via OTA in the WiFi Pineapple Web Interface or grab it the Hak5 Download Portal. ♥ - The Hak5 Development Team
  5. Please post general comments here so we can have one place to answer the common questions.
  6. Hi everyone, I bought a wifi pineapple about a couple of years ago. I've been searching for a battering thin enough to fit the case and be plugged using the U shaped usb connector. I know about the anker and pineapple juince models.. however, I can't find them online (shipping to belgium). Has anyone else found another battery that fits?? Thanks a lot!
  7. Hello Community, Staff: If i'm not in right section sorry and could you move it please Just few words about wi-fi .... Smartphones, tablets, laptops, raspberry pi's,arduino's,consoles, etc ..., many devices around us emit wifi. But when we analyze datas (frames) issued by all these devices, we realize that they are constantly seeking the access points(ISP box) on which they were connected, this is what the we call "Probe Requests". If you have already connected to the wifi of a mcdonald,a supermarket or in a friend's home, you will notice that each time you are near a network to which you have already been connected, and that your wifi is activated, your device will automatically connect to it without asking for a security key again. The probe requests issued by your device are automatically recognized by the access point, so you are automatically connected! Interesting so far ... and ?? And if we could get all its probe requests in real time, classify them by mac address, identify the device that emits them and even observe the power of the device to get an idea of the distance to which it is located from ourself.. and all with a device holding in your pocket !! It would be great indeed ... We could know which device connected to where, so we would have crucial information about our target, such as where she lives, what other places she connected to (hotel, coffee-shop,etc ..) and all with a lightning precision up to its exact address with a live view with street view! Prerequisites: 1 Android device / Smartphone or tablet An internet connection: 3G / 4G or WiFi 1 Micro-USB cable 1 OTG adapter Wifi of device you want to track must be activated. THAT'S ALL! For these investigations i built 2 android apps. Respectively called "AP Sniffer" and "AP Tracker". Where "AP" is Access Point. We need also a piece of cheap hardware to get the job done,a NodeMCU v3.0 module is your guy! Some arduino code to sniff and display results with AP Sniffer app. We need to connect our module with an OTG adapter as in the following image: Once plugged in,we launch the AP Sniffer app. As soon as the connection is made with your module this one will immediately sniff all the devices around you, identify them in real time thanks to their addresses mac (Apple, Samsung, etc ..), determine the power of the signal emitted and especially what are all the access points to which they have already been connected! Let's see this in detail: RSSI: Power of the signal emitted by the devices around you. Measuring in dBm, the more you climb to the -90 plus the device in question is far. Conversely, the lower you get to -50 dBm, the closer the device will be to you. To give you an idea, if the box of your home is in the room next to where you are, you will average -60 dBm. The dBm is an abbreviation of the power ratio in decibels (dB) between the measured power and a milliwatt (mW). DEVICES: You guessed it, these are the devices that surround us. Note that sometimes there may be some latency to appear devices, because the module must first wait for the probe requests so that the application can make a lookup in a text file internally. An up-to-date list of more than 23,000 manufacturers to determine which mac address matches which manufacturer. Also note that some devices issue probe requests every X minutes depending on the model ... Sometimes it can take several minutes to get all the probe requests around you! Each device is different!! You must also take into account the limit of the wifi antenna of your module! If we gain in discretion by the size of the module, we lose in signal range, do not expect to recover all the probe requests of a whole street without moving, be realistic! ACCESS POINTS: As its name implies, it is all access points to which all devices have already connected at least once. These famous probe requests transformed here into mac addresses! You can see how easy it is to see all the requests made by the devices around us. And ?? It's fine but what we do with these mac addresses ?? How do I know where the guy lives with his samsung near me ?? All sweet we come. Now you know which device you want to track, you just have to open our second app AP Tracker. Once started you just have to type the chosen mac address and press Track! I let you observe the impressive result! Now you know the exact address from where this device were connected at least one time! In addition you will have a live view with street view API and GPS coordinates! You are able to track all the probe requests of all the devices that your module will have sniffed ... you now understand the dangers... We reach the end of this story,hoping it will be useful for your own security. Cheers!
  8. MANA-Toolkit! Pineapple NANO + TETRA. (IPK installation-files, and source-files ready to compile with OpenWRT-SDK) MANA Toolkit includes a working version of SSLstrip2+dns2proxy for the Pineapples. Last update: 22.07.2018 Changelog: Taxonomy part of hostapd is activated. Updated to follow upstream, same updated source-code as Sensepost is using. Changes have been done to installation part! Remember to read the output! Will no longer use a copy of my python-library. But download the needed python packages fro SSLstrip2, SSLsplit, dns2proxy, crackapd, net-creds, firelamb and every part of the MANA-Toolkit comes with the package. (Even aslEAP) EAP penetration testing is now very feasible. Install procedure: root@Pineapple:~# wget -qO- https://raw.githubusercontent.com/adde88/hostapd-mana/master/INSTALL.sh | bash -s -- -v -v After a little while you should get a message saying installation was successful. But we're not quite done. You need to install the python-dependencies with this command: root@Pineapple:~# install-mana-depends How do i start MANA? Make sure you are not using wlan1 for anything. (For example having it in monitor mode) If you are, hostapd-mana will not be able to set the interface to 'master' mode Type 'launch-mana' in the terminal to launch the attack. The attack should go silently into the background while at the same time giving output to the screen and to the log-files. root@Pineapple:~# launch-mana Type 'kill-mana' in the terminal to stop the attack. root@Pineapple:~# kill-mana Module: https://github.com/adde88/ManaToolkit I have released a "pre-release" version of the Mana Toolkit "Module" for the Pineapples. This lets you launch the attack from the Pineapples web-interface. General feedback or tips for improving the module are greatly appreciated! Github repo. + source-codes: https://github.com/adde88/hostapd-mana-openwrt https://github.com/adde88/hostapd-mana https://github.com/adde88/ManaToolkit (The Mana Toolkit Module - dev. stage) The first repo. contains the IPK files you need to install everything, but it also contains the files you need to build it yourself with a proper SDK. The second repo. is used by the SDK. The SDK Makefile will download everything it needs from this repo. to build the MANA-Toolkit package. You don’t need to touch the second repo. to get anything up and running. (OpenWRT-SDK shouold handle this automatically.) The third repo. is the MANA Toolkit "Module", that needs testing and feedback from you guys. It also has a new dev-branch that contains my latest fresh changes, but it's not as stable as the master branch. Important directories: Config files: /etc/mana-toolkit/ Log files: /pineapple/modules/ManaToolkit/log (This is the log-directory, even if you don't have the Module installed) You will find the usual MANA Tools at: /usr/share/mana-toolkit/ OPKG Installation Files: (For those who want to install it manually): https://github.com/adde88/hostapd-mana-openwrt/raw/master/bin/ar71xx/packages/base/asleap_2.2-1_ar71xx.ipk https://github.com/adde88/hostapd-mana-openwrt/raw/master/bin/ar71xx/packages/base/hostapd-mana_2.6-15_ar71xx.ipk Donations are very helpful, and would help me contribute towards keeping all of these custom tools ported and up-to-date.
  9. The HCX Pi is based off ZerBea's hcxdumptool project: https://github.com/ZerBea/hcxdumptool Specs: Raspberry Pi 3B+ running Arch Linux Alfa AWUS036NH adapter Custom board for multiple status LEDs and control button 3D printed enclosure. The purpose of the hardware is to have a small self-contained portable tool for capturing WPA2 PMKIDs The hardware could easily be repurposed for many other applications as well (more coming soon!). LEDs are for power, ACT for Pi, and hcxdumptool status LED based off the script from github project. If there is interest in a build log please leave a reply and I will consider making one. Future improvements are a smaller case and internal battery.
  10. Hi everyone, just started out with my pineapple so bare with me. I have set my pineapple up on my laptop previous to this post and was working fine. But now i wanted to set it up on my Galaxy s8 and when i power on the pineapple and connect my phone, it gets stuck on "Waiting for connection". I have enabled tethering and yes my carrier supports tethering. Not really sure what my next move is.
  11. Hi Everyone. I am having issues downloading any dependencies for the Wifi Pineapple Nano. I have rebooted my Pineapple Nano several times (Factory Reset) and have ensured that my SD Card can be seen (I am able to download modules to the SD Card). It will show that it is installing and then go back to the red "Not Installed" Has anyone else encountered this issue? Any luck in remediating this issue? Thanks in advance!
  12. I have been assigned a task of combining 2 wifi signals into a tablet. One signal would come from a Iridium Go! satellite hotspot that puts out 2.4ghz wifi and the other a dynon adsb (which is like a radar acquisition unit for small planes). This would go to 1 program (ifly) . Would the wifi pineapple tetra do this? I'm sorry for the long winded explanation, but I needed to explain how it would work. I should mention they both work on 2.4 Ghz band. The sat hotspot would receive weather and the dynon unit would receive ads-b. I know the type of data isn't important, more fyi. Thanks for any help, Alaska Pilots.
  13. Hello everybody I'm new to this but I'm pretty familiar with how to have it up and running on Android. Mike recently bought a WiFi pineapple nano tactical kit I upgraded the firmware and did the setup via Android. I got the internet connection going pretty much everything is looking good however I'm having trouble understanding the wifi dongle that the tactical kit came with. I do know that you need it to set wlan2 how can I manage to do that on Android? If I connect the dongle to the nano how do I log in using my phone without going into the pineapple app that requires USB tether? What do I have to use another device rather than using the Android? Any tips would be greatly appreciated thank you in advance.
  14. Hello everybody I'm new to this but I'm pretty familiar with how to have it up and running on Android. I recently bought a WiFi pineapple nano tactical kit I upgraded the firmware and did the setup via Android. I got the internet connection going pretty much everything is looking good however I'm having trouble understanding the wifi dongle that the tactical kit came with. I do know that you need it to set wlan2 how can I manage to do that on Android? If I connect the dongle to the nano how do I log in using my phone without going into the pineapple app that requires USB tether? Do I have to use another device rather than using the Android? Any tips would be greatly appreciated thank you in advance.
  15. Hi! If anyone needs good password list for bruteforce hacking - bigpasswordlist.com I've downloaded all biggest lists and merged them together. List is good.
  16. Hi, I'm trying to set up a wifi access point using an Alfa AWUS036AC Wireless Adapter. My hostapd.conf file is below. I am having three problems with the access point, and I believe they may be related. Any help is appreciated. The three problems: 1. Network capture shuts down in the middle. Error: "network adapter on which the capture was being done is no longer running; the capture has stopped" 2. "Incorrect Password" error when the password is correct 3. Once connected to Mywifi, there is no internet available. Hostapd.conf: #hostapd.conf interface=wlan0 driver=nl80211 ssid=Mywifi channel=1 macaddr_acl=0 accept_mac_file=./allowed_macs logger_syslog=-1 logger_syslog_level=2 wpa=2 wpa_passphrase=password1 wpa_key_mgmt=WPA-PSK wpa_pairwise=CCMP rsn_pairwise=CCMP
  17. Hi All, Just a quick question regarding the WiFi pineapple NANO, I was going to test client mode on the pineapple but when inserting the usb WiFi adapter that comes with the pineapple it turns out it doesn’t work, it’s not to much of an issue I used another WiFi adapter whiched worked, are there drivers I need to install to get the WiFi adapter that Hak5 supplied working with the pineapple.
  18. Hello all, I need to test attacks on Tera, So first I need to set up and test all modules and attacks. would anyone help me? Thank you all.
  19. Anybody have a guesstimate as to when the Pineapple WiFi will be restocked?
  20. Hi guys, I have a problem: I want to hack my Wifi but all the attacks which I found only worked for WPS 1.0 but not on my WPS 2.0. Of course I am open minded for other ways to hack my wifi but none of the attacks which I found worked.🙄😞
  21. Hi All, I got my WiFi pineapple nano a few days ago and I'm playing around with it and learning how to use it, I have inserted an 8gb sd card to install modules on, i have installed the deauth module from the pineapple modules page for the nano, it was successfully installed but when installing the dependencies the red bar goes to Orange "Installing dependencies" then goes back to red like its not installed, before i ssh into it to see whats going on with the install i thought i might ask as it may be something you guys have seen before. What trouble shooting techniques are there for this issue?
  22. Hi, When I want to execute hostapd-wpe on Wifi Pineapple I don't have problems, but when someone connects to the AP, it appears the following error: Using interface wlan1 with hwaddr 00:13:37:a7:11:80 and ssid "AcrylicWiFi-bgn" wlan1: interface state UNINITIALIZED->ENABLED wlan1: AP-ENABLED wlan1: STA 10:b1:f8:ae:c0:4b IEEE 802.11: authenticated wlan1: STA 10:b1:f8:ae:c0:4b IEEE 802.11: associated (aid 1) wlan1: CTRL-EVENT-EAP-STARTED 10:b1:f8:ae:c0:4b wlan1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=1 wlan1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25 SSL: TLS processing failed I use default configuration. How can I fix this problem? Thx!
  23. I cannot reach the setup page for the wifi pineapple tetra( http://172.16.42.1:1471 ), I am currently using windows 10, however i have also tried using a Kali Virtual machine, I have tried every solution so far, Can anyone help?
  24. I'm trying to spoof my Surface 4 Pro's WiFi MAC address. It's running Win10, and the stock Marvel driver mrvlpcie8897 circa 2016. Using Powershell, like Darren shows in his video here: MAC Spoofing for Free in-flight Wi-Fi (and monkeys) - Hack Across The Planet - Hak5 2208 https://youtu.be/vuY-u-HfSMs?t=478 ...it appears my driver doesn't permit changing MAC address. My question is- what driver is recommended (what driver is Darren using on his W10 platform?) and where can I get a hold of it? I also tried using an Alfa AWUS036H, USB-WiFi adaptor...but its driver also prohibits MAC spoofing. Any ideas? Thanks.
  25. An extremely asked theme is how to hack an wifi network easily, today i has the answer to you question totally free. Today is possible to attach a kali linux to your windows totally free and by a quickly mode, using Virtual Box the work is dis complicated. In the link bellow i taught how to hack any wifi with any operational system. You can ask for help in the post comments... Click here to go to article
×
×
  • Create New...