Jump to content
Hak5 Forums

Search the Community

Showing results for tags 'wifi'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • WiFi Pineapple
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapple University
    • WiFi Pineapples Mark I, II, III
  • Hak5 Gear
    • Bash Bunny
    • Packet Squirrel
    • LAN Turtle
    • USB Rubber Ducky
  • Hak5 Shows
    • Hak5
    • HakTip
    • Metasploit Minute
    • Threatwire
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests

Found 83 results

  1. Whistle Master

    General NANO Discussion

    Please post general comments here so we can have one place to answer the common questions.
  2. I'm looking for second hand wifi pineapple mark v, Needs to be affordable and not too pricey also be nice if ships from canada unless you offer free shipping. Just looking for the pineapple itself with default antennas and power adapter nothing else.
  3. Hey guys, I have no professional background in IT and am learning how to use a PineApple Nano as a job for a friend of mine who has but has no time himself to do it. The goal is to be able to use the PineApple for a demonstration to show an audience that you can Man-In-The-Middle between their mobile devices and an AP provided for the demonstration, that you can read their traffic and lure them on an Evil Portal. I have a hard time finding step-by-step tutorials for the recent build and for someone that is an amateur and really has to be lead to the simplest steps. What I managed to achieve so far: 1. I set up my WiFi PineApple Nano on a Windows 7 Professional computer and established an Internet Connection 2. I downloaded the latest update and bulletins and also currently three modules, SSLSplit, DWall and Evil Portal 3. I ran Recon Scans, saw local SSIDs and added them and their MAC adress to my Filter and PineAP Pool 4. I've been trying to follow the PineApple Primer video and ran the PineAP accordingly. With an open WiFi I created here, I could passively listen to unsecured traffic on a device I connected with that and show it in WireShark and DWall 5. What I am now trying to do is make my PineApple pretend its an open WiFi and grant access to the Internet. Currently devices can connect to such a pretender AP but then dont have access to the Internet. 6. I would also like to be able to listen to secured traffic. If you have any ressources I could read up upon or watch, I'd be grateful. Kind regards
  4. After update my pineapple tetra with the 2.02 firmware, i can't get working the open SSID wireless. I get "authentication error" when i try to connect with any device. I performed a factory reset from console and pushing the back buttom but i have no luck... Any idea?
  5. hey guys so any time i try to use my usb wifi network card in the vm on parrot or kali they both wont connect to it. what am i doing wrong here? thank you all for your help in advance
  6. Hi, I am looking at buying a pocket squirrel to connect to a vpn. If I plug an Ethernet cable from my computer to pocket squirrel can I connect the squirrel to the internet using a wifi adapter in the usb port? I do not have an ethernet cable to connect the squirrel to the internet. Please let me know ASAP. Thanks.
  7. Hey everyone, does anybody know, if i can use this usb-wifi as a third radio for my Nano? => https://www.amazon.de/AVM-FRITZ-WLAN-Stick-Mbit/dp/B000X27VAW
  8. austin1696

    Questions about PineAP

    Hello, Ive been using my nano for a few days now, and I ran across a small problem. After I activate PineAP Daemon, and click save, and after its running, attempt to select any of the log boxes or "allow associations" and click save it will de-select itself and wont activate. Any idea on what the problem is? Not being able to allow associations is crippling to my nano. fyi I haven't changed any default config settings. Thanks in advance.
  9. I have a WiFi network that I connect to using my AD credentials. This means I need to use a username and password combination instead of just a password. Is it possible to connect the pineapple to that network using the client mode (or on SSH terminal)? Client mode GUI doesn't allow me to connect using a username
  10. sabyrzhanka

    error connection refused

    Hi guys, When I share internet from Pineapple, clients are able join to my wifi network, but cannot get access to the internet. There is an error message "error connection refused" in browser. Could someone help me to solve
  11. Ok so I'm setting up my nano and I've done the whole setup process which went fine but now I'm to the bulletin update and I can't get it to find my wifi. I've discovered that if I disconnect the pineapple from the USB then refresh the internet it works just fine. So there is something that I'm missing "something that I neglected to do "clearly."" I'm using a 2018 MacBook Pro Also I might add that I'm a complete green hat newbie at this. I'll be starting a Hunt program very soon and I'd love to add the nano into my arsenal of tools. Again to recap I've connected the nano to the MacBook with both USB's then followed the setup process which went smoothly "or so I thought" but now that I'm on the dashboard the bulletin will not refresh do to an error of no internet connection. when I disconnect the nano from its USB then the internet works fine. When I plug it back in nothing works again. I'm sure this question has been asked so if you know the page the thread is on that would be great. Otherwise some advice would be very nice. Thank you, N.
  12. Hi, It would be great to see a full list of supported USB WiFi chipsets somewhere on the forums. I have been looking for a long time, but I can only find a few supported chipsets for firmware version 1.0 and those adapters are hard to get a hold of. So can anyone give me such a list? Thanks in advance, Snaak
  13. I recently bought the wifi pineapple nano and have been experiencing a ton of problems trying to set it up through windows. When I first set it up everything was fine and as normal but when trying to connect my phone as a client, nothing would work even though the pineapple was pulling up the bulletins. After a while of trying a few different things the nano wouldn't even connect to the internet anymore. I have since tried to reset it with the button on the bottom and now when browsing to its IP, I can't even set it up anymore through the web browser. Does anyone have any ideas for me I'm getting extremely frustrated.
  14. I was pointed to this by an LE contact: http://insider.foxnews.com/2018/02/07/google-tracking-you-tucker-carlsons-report-silicon-valley-surveillance-capitalism The kit used by the reporter - anyone know what it is? I can tell that these are being used: The device in the middle is a Throwing Star Lan Tap: https://greatscottgadgets.com/throwingstar/ The device on the right is an Intel CPU stick: https://www.amazon.com/Intel-Compute-Computer-processor-BOXSTK2m3W64CC/dp/B01AZC4IKK The rest of it looks like probably standard WiFi, maybe a large battery to power the whole setup. I'd guess SSLstrip or something similar to penetrate https, but what about the software being used? Anyone know what it might be? I also assume this kit isn't a package, but if so, the LE guy wants one :)
  15. hadodogofr

    Best wifi usb for kali

    I'm looking for the best dual band usb device for kali. I want to do packet injection. I found a list of usb wifi kali devices here , here is the list: * Alfa AWUS036ACH * Tp-link T4UHP AC1300 Do you know more devices? are those the best ones? I don't want to pay more than 60usd-70usd
  16. MANA-Toolkit! Pineapple NANO + TETRA. (IPK installation-files, and source-files ready to compile with OpenWRT-SDK) MANA Toolkit includes a working version of SSLstrip2+dns2proxy for the Pineapples. Last update: 06.01.2018 Changelog: Updated to support latest Pineapple FW 2.0.2. (Just added some needed env. vars.) SSLstrip2, SSLsplit, dns2proxy, crackapd, net-creds, firelamb and every part of the MANA-Toolkit comes with the package. (Even aslEAP) Install procedure: root@Pineapple:~# wget -qO- https://raw.githubusercontent.com/adde88/hostapd-mana/master/INSTALL.sh | bash -s -- -v -v How do i start MANA? Make sure you are not using wlan1 for anything. If you are, hostapd-mana will not be able to set the interface to 'master' mode Type 'launch-mana' in the terminal to launch the attack. The attack will go silently into the background while at the same time giving output to the screen and log-files. root@Pineapple:~# launch-mana Type 'kill-mana' in the terminal to stop the attack. root@Pineapple:~# kill-mana Module: https://github.com/adde88/ManaToolkit I have released a pre-release version of the Mana Toolkit "Module" for the Pineapples. This lets you launch the attack from the Pineapples web-interface. General feedback or tips for improving the module are greatly appreciated! Github repo. + source-codes: https://github.com/adde88/hostapd-mana-openwrt https://github.com/adde88/hostapd-mana https://github.com/adde88/ManaToolkit (NEW BLEEDING-EDGE / DEV. BRANCH IS UP) The first repo. contains the IPK files you need to install everything, but it also contains the files you need to build it yourself with a proper SDK. The second repo. is used by the SDK. The SDK Makefile will download everything it needs from the github repo. to build the MANA-Toolkit package. You don’t need to touch the second repo. to get anything up and running. (OpenWRT-SDK handles this automatically.) The third repo. is the MANA Toolkit "Module", that needs testing and feedback from you guys. It also has a new dev-branch that contains my latest fresh changes, but it's not as stable as the master branch. Important directories: Config files: /etc/mana-toolkit/ Log files: /pineapple/modules/ManaToolkit/log (This is the log-directory, even if you don't have the Module installed) You will find the usual MANA Tools at: /usr/share/mana-toolkit/ OPKG Installation Files: (For those who want to install it manually) https://github.com/adde88/hostapd-mana-openwrt/raw/master/bin/ar71xx/packages/base/asleap_2.2-1_ar71xx.ipk https://github.com/adde88/hostapd-mana-openwrt/raw/master/bin/ar71xx/packages/base/hostapd-mana_2.6-5_ar71xx.ipk
  17. SquidyP

    Radio Suggestions Please

    Hello everyone, My name is Squidy P and it has been six months since my last....wrong forum? To soon? Anyway, this is my first post and I am new to true hacking and pentesting. I have been messing with Linux for years and really enjoy the OS and getting under the hood. After watching some the HakTips I realize that I don't know that much about wifi or radios in general. I am looking to get a USB wifi adapter for testing and getting my feet wet. I don't think I should start with the Pineapple, although I am salivating wanting to get my hands on it. I think if I got a Pineapple I would be like a teenager who found himself is a strip club for the first time...just wouldn't know where to start. I want to start small but with capability. Goal is to hack my own WPA2 password and I am pretty sure my Surface 3 (non-pro)'s wifi won't do monitor mode. Any suggestions on a good radio to start with?
  18. Okay, I feel dumb here: I have an ethernet-IP-cam and the only source for internet-access is a open Wifi-hotspot since the telephone-company thinks that area is a tiny town and nfortunately the DSL-connection there is total rubbish, not even near 2MBit downstream (~500kbit up is not even enough for sending emails...). As far as I understand it, if I connect the IP-cam over ethernet to the Pineapple V I can connect to the internal wifi-router to get access to the cam's webitnerface. BUT: How can I connect it to the open hotspot AND connect to the webcam? The hotspot-router doesn't allow access to the local IPs of the WLAN. Another prob is, that hotspot has a captive portal with a "click here to accept our terms" button AND the router disconnects the netaccess after 200MB/day per MAC-adress (I guess). Did anyone had to deal with something similar?
  19. I have problems to connect to the open wifi network of "wifi pineapple nano", I currently have firmware 2.0.2 and I did a factory reset edit: Fixed
  20. I have been working around the Evil Twin Airbase-ng for quite a while and i am unable to get my victim PC which is my other windows 10 machine to connect; It did connect to the AP once(rarely) and when it did it had no internet connect which has kept me up for sometime, i am going to post the proccess i have performed please go through them and guide me through the issue. Note:i have tried iptables and echo 1 it didnt help Setting up USB Adapter TP-LINK TL-WN722N Version 1 to monitor mode airmon-ng start wlan0 Checking for background proccesses that can interfere with the work airmon-ng check wlan0mon(assigned new name) Setting up the Fake AP airbase-ng -a 72:02:71:73:0D:B6 --essid Ryan -c 1 wlan0mon 17:19:25 Created tap interface at0 17:19:25 Trying to set MTU on at0 to 1500 17:19:25 Trying to set MTU on wlan0mon to 1800 17:19:25 Access Point with BSSID 72:02:71:73:0D:B6 started. 17:19:40 Client D0:13:FD:07:79:07 associated (WPA2;CCMP) to ESSID: "Ryan" 17:19:41 Client 20:16:D8:F4:0D:98 associated (WPA2;CCMP) to ESSID: "Ryan" 17:19:57 Client 20:16:D8:F4:0D:98 associated (unencrypted) to ESSID: "Ryan" 17:20:03 Client 20:16:D8:F4:0D:98 associated (unencrypted) to ESSID: "Ryan" Deauthorizing clients on another terminal aireplay-ng -0 0 -a 72:02:71:73:0D:B6 wlan0mon 17:22:11 Waiting for beacon frame (BSSID: 72:02:71:73:0D:B6) on channel 1 NB: this attack is more effective when targeting a connected wireless client (-c <client's mac>). 17:22:11 Sending DeAuth to broadcast -- BSSID: 72:02:71:73:0D:B6 17:22:11 Sending DeAuth to broadcast -- BSSID: 72:02:71:73:0D:B6 17:22:12 Sending DeAuth to broadcast -- BSSID: 72:02:71:73:0D:B6 17:22:12 Sending DeAuth to broadcast -- BSSID: 72:02:71:73:0D:B6 17:22:13 Sending DeAuth to broadcast -- BSSID: 72:02:71:73:0D:B6 17:22:13 Sending DeAuth to broadcast -- BSSID: 72:02:71:73:0D:B6 17:22:14 Sending DeAuth to broadcast -- BSSID: 72:02:71:73:0D:B6 17:22:14 Sending DeAuth to broadcast -- BSSID: 72:02:71:73:0D:B6 17:22:15 Sending DeAuth to broadcast -- BSSID: 72:02:71:73:0D:B6 Installing DHCP server apt-get install isc-dhcp-server Reading package lists... Done Building dependency tree Reading state information... Done isc-dhcp-server is already the newest version (4.3.5-3+b1). The following packages were automatically installed and are no longer required: casefile dconf-editor dconf-tools dissy gir1.2-nm-1.0 libbind9-140 libblas-common libcdio-cdda1 libcdio-paranoia1 libcdio13 libdns162 libemu2 libfwupd1 libgom-1.0-common libgtkspell3-3-0 libhttp-parser2.1 libisc160 libisccfg140 libllvm3.9 liblouis12 liblwgeom-2.3-0 libmozjs-24-0 libopencv-calib3d2.4v5 libopencv-core2.4v5 libopencv-features2d2.4v5 libopencv-flann2.4v5 libopencv-highgui2.4-deb0 libopencv-imgproc2.4v5 libopencv-objdetect2.4v5 libopencv-video2.4v5 libpython3.5 libpython3.5-minimal libpython3.5-stdlib libqcustomplot1.3 libqgis-core2.14.18 libqgis-gui2.14.18 libqgis-networkanalysis2.14.18 libqgispython2.14.18 libradare2-1.6 libtracker-control-1.0-0 libtracker-miner-1.0-0 libtracker-sparql-1.0-0 libva-drm1 libva-x11-1 libva1 maltegoce peepdf python-brotlipy python-pylibemu python-rsvg python-unicorn python3.5 python3.5-minimal tcpd Use 'apt autoremove' to remove them. 0 upgraded, 0 newly installed, 0 to remove and 30 not upgraded. Configuring nano /etc/dhcp/dhcpd.conf authoritative; subnet 192.168.1.0 netmask 255.255.255.0 { option broadcast-address 192.168.1.255; option routers 192.168.1.1; option domain-name-servers 8.8.8.8; range 192.168.1.10 192.168.1.200; default-lease-time 600; max-lease-time 7200; } Installing bridging utilities apt-get install bridge-utils Reading package lists... Done Building dependency tree Reading state information... Done bridge-utils is already the newest version (1.5-14). The following packages were automatically installed and are no longer required: casefile dconf-editor dconf-tools dissy gir1.2-nm-1.0 libbind9-140 libblas-common libcdio-cdda1 libcdio-paranoia1 libcdio13 libdns162 libemu2 libfwupd1 libgom-1.0-common libgtkspell3-3-0 libhttp-parser2.1 libisc160 libisccfg140 libllvm3.9 liblouis12 liblwgeom-2.3-0 libmozjs-24-0 libopencv-calib3d2.4v5 libopencv-core2.4v5 libopencv-features2d2.4v5 libopencv-flann2.4v5 libopencv-highgui2.4-deb0 libopencv-imgproc2.4v5 libopencv-objdetect2.4v5 libopencv-video2.4v5 libpython3.5 libpython3.5-minimal libpython3.5-stdlib libqcustomplot1.3 libqgis-core2.14.18 libqgis-gui2.14.18 libqgis-networkanalysis2.14.18 libqgispython2.14.18 libradare2-1.6 libtracker-control-1.0-0 libtracker-miner-1.0-0 libtracker-sparql-1.0-0 libva-drm1 libva-x11-1 libva1 maltegoce peepdf python-brotlipy python-pylibemu python-rsvg python-unicorn python3.5 python3.5-minimal tcpd Use 'apt autoremove' to remove them. 0 upgraded, 0 newly installed, 0 to remove and 30 not upgraded. Bridging interface root@kali:~# brctl addbr evil \\Name of the bridge i made root@kali:~# brctl addif evil eth0 \\my ethernet connection root@kali:~# brctl addif evil at0 root@kali:~# ifconfig at0 0.0.0.0 up root@kali:~# ifconfig evil up Starting DHCP server root@kali:~# systemctl start smbd.service root@kali:~# dhclient evil root@kali:~# service isc-dhcp-server restart root@kali:~# service isc-dhcp-server status ? isc-dhcp-server.service - LSB: DHCP server Loaded: loaded (/etc/init.d/isc-dhcp-server; generated; vendor preset: disabled) Active: active (running) since Wed 2017-12-06 17:32:35 EST; 6s ago Docs: man:systemd-sysv-generator(8) Process: 2049 ExecStart=/etc/init.d/isc-dhcp-server start (code=exited, status=0/SUCCESS) Tasks: 1 (limit: 4915) CGroup: /system.slice/isc-dhcp-server.service +-2061 /usr/sbin/dhcpd -4 -q -cf /etc/dhcp/dhcpd.conf eth0 Dec 06 17:32:33 kali systemd1: Starting LSB: DHCP server... Dec 06 17:32:33 kali isc-dhcp-server2049: Launching IPv4 server only. Dec 06 17:32:33 kali dhcpd2060: Wrote 11 leases to leases file. Dec 06 17:32:33 kali dhcpd2060: Multiple interfaces match the same subnet: eth0 evil Dec 06 17:32:33 kali dhcpd2060: Multiple interfaces match the same shared network: eth0 evil Dec 06 17:32:33 kali dhcpd2061: Server starting service. Dec 06 17:32:35 kali isc-dhcp-server2049: Starting ISC DHCPv4 server: dhcpd. Dec 06 17:32:35 kali systemd1: Started LSB: DHCP server. /etc/init.d/isc-dhcp-server start ok Starting isc-dhcp-server (via systemctl): isc-dhcp-server.service. IP gateway root@kali:~# route -n Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface 0.0.0.0 192.168.1.1 0.0.0.0 UG 100 0 0 eth0 0.0.0.0 192.168.1.1 0.0.0.0 UG 600 0 0 wlan0 192.168.1.0 0.0.0.0 255.255.255.0 U 100 0 0 eth0 192.168.1.0 0.0.0.0 255.255.255.0 U 600 0 0 wlan0
  21. Hi all, I'm a newbie to Hak5 Forums, so if this thread is in the wrong category, it would be great if the admins could move it to the correct category. Most of you are probably using 'BO' as the region for 'iw' on Linux. This allows the WiFi interface to operate at 30dBm (1 Watt) at max. However, if you're like me and have a device that is capable of transmitting over 1W (I have Alpha Network AWUS036NH - 2W), you might be interested in increasing the TX power beyond 30dBm. By default, selecting 'BO' as the region only allows the device to operate at a maximum of 30dBm. I tested this on my Raspberry Pi 3, Model B running Kali Linux (with the kali-linux-full metapackage). *** If you are lazy and don't want to follow these manual steps below, I made two bash scripts that will work on Kali Linux and Ubuntu : https://github.com/hiruna/wifi-txpower-unlocker Working directory: /root Steps: 1. Update and upgrade apt-get update apt-get upgrade 2. Install dependencies to compile apt-get install pkg-config libnl-3-dev libgcrypt11-dev libnl-genl-3-dev build-essential 3. Download the latest Central Regulatory Domain Agent (CRDA) and Wireless Regulatory Database I downloaded crda-3.18.tar.xz and wireless-regdb-2017.03.07.tar.xz wget https://www.kernel.org/pub/software/network/crda/crda-3.18.tar.xz wget https://www.kernel.org/pub/software/network/wireless-regdb/wireless-regdb-2017.03.07.tar.xz 4. Unzip the downloaded files tar xvJf crda-3.18.tar.xz tar xvJf wireless-regdb-2017.03.07.tar.xz 5. Navigate into wireless-regdb-2017.03.07 cd wireless-regdb-2017.03.07 6. Open db.txt and locate the region BO section nano db.txt You will see something like this: country BO: DFS-JP (2402 - 2482 @ 40), (30) (5250 - 5330 @ 80), (30), DFS (5735 - 5835 @ 80), (30) The number in the second set of brackets (for each frequency) is the txpower. Since I'm using the 2.4Ghz and want a txpower of 2W (~33dBm), I changed the 20 to 33, and saved the file: country BO: DFS-JP (2402 - 2482 @ 40), (33) (5250 - 5330 @ 80), (30), DFS (5735 - 5835 @ 80), (30) I also noticed that region AU allows 36dBm for 2.4Ghz, so you could just continue without modifying the region BO: country AU: DFS-ETSI (2400 - 2483.5 @ 40), (36) (5150 - 5250 @ 80), (23), NO-OUTDOOR, AUTO-BW (5250 - 5350 @ 80), (20), NO-OUTDOOR, AUTO-BW, DFS (5470 - 5600 @ 80), (27), DFS (5650 - 5730 @ 80), (27), DFS (5730 - 5850 @ 80), (36) (57000 - 66000 @ 2160), (43), NO-OUTDOOR However, I checked with Kali Linux (without compiling and changing the regulatory.bin) and it showed that max txpower was only 20dBm: country AU: DFS-ETSI (2402 - 2482 @ 40), (N/A, 20), (N/A) (5170 - 5250 @ 80), (N/A, 17), (N/A), AUTO-BW (5250 - 5330 @ 80), (N/A, 24), (0 ms), DFS, AUTO-BW (5490 - 5710 @ 160), (N/A, 24), (0 ms), DFS (5735 - 5835 @ 80), (N/A, 30), (N/A) So I'm assuming Kali Linux is using an old regulatory.bin and legislation in AU has changed. 7. Compile make 8. Backup up your old regulatory.bin file and move the new file into /lib/crda mv /lib/crda/regulatory.bin /lib/crda/regulatory.bin.old mv regulatory.bin /lib/crda As mentioned in https://wireless.wiki.kernel.org/en/developers/regulatory/crda and https://wireless.wiki.kernel.org/en/developers/regulatory/wireless-regdb, we need to include RSA public keys in crda-3.18/pubkeys. I noticed that there are already 2 .pem files in crda-3.18/pubkeys: sforshee.key.pub.pem linville.key.pub.pem 9. Copy root.key.pub.pem into crda-3.18/pubkeys. I also copied sforshee.key.pub.pem from wireless-regdb-2017.03.07 as it was newer: cp root.key.pub.pem ../crda-3.18/pubkeys/ cp sforshee.key.pub.pem ../crda-3.18/pubkeys/ I found that there are two other pubkeys located at /lib/crda : -rw-r--r-- 1 root root 451 Jan 18 12:58 benh@debian.org.key.pub.pem -rw-r--r-- 1 root root 451 Jan 18 12:58 linville.key.pub.pem -rw-r--r-- 1 root root 451 Jan 18 12:58 sforshee.key.pub.pem So I copied them too (wasn't too sure whether I needed to copy them): cp /lib/crda/pubkeys/benh\@debian.org.key.pub.pem ../crda-3.18/pubkeys/ cp /lib/crda/pubkeys/linville.key.pub.pem ../crda-3.18/pubkeys/ 10. Navigate into crda-3.18 and open the Makefile cd ../crda-3.18 nano Makefile In Kali Linux, crda is located at /lib/crda instead of /usr/bin/crda, so in the file change the 3rd line REG_BIN?=/usr/lib/crda/regulatory.bin to REG_BIN?=/lib/crda/regulatory.bin : REG_BIN?=/lib/crda/regulatory.bin 11. In the Makefile, find the line CFLAGS += -std=gnu99 -Wall -Werror -pedantic and remove the -Werror option (I couldn't compile without changing it as it treats warnings as errors): CFLAGS += -std=gnu99 -Wall -pedantic 12. Compile make clean make make install That's it! I rebooted my Raspberry Pi after compiling. reboot 13. Now let's change the region and set the txpower to 33dBm: ifconfig wlan1 down iw reg set BO iwconfig wlan1 txpower 33 ifconfig wlan1 up
  22. Pingu

    Wifi WPA2 client

    Hi, hope you guys can help... I'm trying to get my Packet Squirrel to connect to a WPA2 network. But no luck. Running in 'Arming Mode' I've attached a USB wifi nic. It seems to be identified correct: usb 1-1: new high-speed USB device number 6 using ehci-platform usb 1-1: reset high-speed USB device number 6 using ehci-platform ieee80211 phy1: rt2x00_set_rt: Info - RT chipset 5390, rev 0502 detected ieee80211 phy1: rt2x00_set_rf: Info - RF chipset 5370 detected ieee80211 phy1: Selected rate control algorithm 'minstrel_ht' Running ifconfig does not show a wlan0 interface, but I can bring it up using 'ifconfig wlan0 up'. How do I make it connect to a local wireless network using WPA2? Can it run/connect automatically at boot or do I need to run from a payload script? Thanks.
  23. So I have my wifi pineapple set up and everything, I need to install wp6.sh for wifi sharing. So I do the command wget wifipineapple.com/wp6.sh. It installs I do the chmod +x wp6.sh, then I ran the application ./wp6.sh. It comes up with a menu for many options. I do guided install then it tells me y/n for 3 things I do y for all of them. Then I hit c to continue with current settings. It says travel to the website for wifi pineapple. But up above it says this SIOCDELRT: no such process and right below it says, eth0: Unknown host I am running on kali linux. thx, Cameron ps, the bulletins don't load.
  24. hackabus

    RT5370 not working in Kali

    ok so im stumped, have installed the ralink-fw for the 5370 yet my kali machine will still not detect this adaptor, the hak5 site states this adaptor works with kali yet for me its not, i have other adaptors but i like how small this is thanks in advance
  25. spyfly

    NANO shutting off?

    Hey. I got this WiFi Pineapple-NANO for christmas and I'm trying to get it set up correctly..I plugged it in, followed the instructions and started to update the firmware, the blue light didn't start blinking at all as I pressed upgrade, so I decided to unplug it and try again. Now when i plug it into my computer it blinks once, turns solid blue for about 3-4 seconds and then the light goes out. I have tried to follow the instructions on https://www.wifipineapple.com/pages/faq for firmware reset without luck. But I do realize I might be doing something wrong, as I simply go to my routers control panel as I browse to 192.168.1.1 I do have 'Bus 001 Device 018: ID 0b95:772a ASIX Electronics Corp. AX88772A Fast Ethernet' under lsusb so I know its recognized, but as far as I can tell it only recognizes it if I'm NOT holding down the reset buttom as i plug it in. Can anyone please tell me where I go from here?
×