leg3nd Posted November 30, 2013 Author Share Posted November 30, 2013 So I've been trying to install JasagerPwn on the latest firmware, and it doesnt look like its gonna work. I got it to install on Kali 1.05 ok. but I can't seem to get it from my Kali box to the pineapple. I reall like the whole concept/idea of JasagerPwn Reborn. It sounds so bad ass. Do you think that i could inject those same exploits/payloads mentioned in this post with "strip-n-inject" ? sorry for askin, but im at my wits end here. I'v been reading this post all night and still havent had any luck.anyways, please hit me up. I'm going to need a bit more information. I haven't had much time to try the new pineapple firmwares, but I would guess it should still work fine. There really isn't much to "install" on the pineapple other than the infusions (dnsspoof, sslstrip, strip-n-inject) which the attack vectors utilize. What is the problem that's occurring? What steps should I take to reproduce your problem? Quote Link to comment Share on other sites More sharing options...
PatriceKing Posted February 3, 2014 Share Posted February 3, 2014 this looks like a great infusion... but the last post is from Nov 2013, and the infusion is not in the "Bar" ... something went wrong? And the silly question, how can I install it on my MK V to try it? Thanks Quote Link to comment Share on other sites More sharing options...
Whistle Master Posted February 3, 2014 Share Posted February 3, 2014 This is not an infusion but a script. The instruction on how to install it are detailed in the first post. Download / Update Download via Subversion (sudo apt-get install subversion): svn checkout http://jasagerpwn-reborn.googlecode.com/svn/trunk/ jasagerPwn-Reborn Update Script to Latest Revision: ./jasagerPwn -u Quote Link to comment Share on other sites More sharing options...
PatriceKing Posted February 3, 2014 Share Posted February 3, 2014 Thanks WM!My bad. I have to install it on my linux box then. Can't be used from the pineapple on wind0wz,,, Quote Link to comment Share on other sites More sharing options...
lunokhod Posted February 6, 2014 Share Posted February 6, 2014 This looks great. I'm going to try it out on my pen test lab at home in coming days. A quick question about deauth... in jasagerPwn the first item in CONFIGURATION / VARIABLES is :- # [System Information]deauth_interface="wlan0" # Interface for local deauthentication attacks I'd prefer to use my Alfa 036H plugged into the WiFi Pineapple as wlan2. Does jasagerPwn allow you to select which interface you want to use to deauth clients?I know I'll find this out when I get everything set up properly... :-) Regards, Lunokhod Quote Link to comment Share on other sites More sharing options...
Carnivore Posted February 8, 2014 Share Posted February 8, 2014 (edited) Hey there, a quick basic question, since I failed to get a working internet connection for the pineapple when running jasagerpwn today: The pineapple (mark IV) is connected at eth0 of my kali machine, which is connected to the net via wifi (wlan0), which I set up in the script. Do I need to disable the pineapples routing for the script to run (like with the first jasagerpwn script)? Or is it just setting a static ip, running the wp4.sh with that IP and finally starting jasagerpwn? Thanks in advance, Carni PS: I'd prefer to use my Alfa 036H plugged into the WiFi Pineapple as wlan2. Does jasagerPwn allow you to select which interface you want to use to deauth clients? Just change this part in the script. Edited February 8, 2014 by Carnivore Quote Link to comment Share on other sites More sharing options...
leg3nd Posted March 17, 2014 Author Share Posted March 17, 2014 This looks great. I'm going to try it out on my pen test lab at home in coming days. A quick question about deauth... in jasagerPwn the first item in CONFIGURATION / VARIABLES is :- # [System Information]deauth_interface="wlan0" # Interface for local deauthentication attacks I'd prefer to use my Alfa 036H plugged into the WiFi Pineapple as wlan2. Does jasagerPwn allow you to select which interface you want to use to deauth clients? I know I'll find this out when I get everything set up properly... :-) Regards, Lunokhod Sorry if the comment was unclear but that is intended for local deauthentication attacks (local being the attacker computer). If you would like to execute deauth attack from the pineapple then I recommend using Whistle Master's "WiFi Jammer" infusion. I tend to perform deauth attack from both depending on the physical situation )interference and signal strengths). Quote Link to comment Share on other sites More sharing options...
leg3nd Posted March 17, 2014 Author Share Posted March 17, 2014 Hey there, a quick basic question, since I failed to get a working internet connection for the pineapple when running jasagerpwn today: The pineapple (mark IV) is connected at eth0 of my kali machine, which is connected to the net via wifi (wlan0), which I set up in the script. Do I need to disable the pineapples routing for the script to run (like with the first jasagerpwn script)? Or is it just setting a static ip, running the wp4.sh with that IP and finally starting jasagerpwn? Thanks in advance, Carni PS: Just change this part in the script. This script is a bit different then the original jasagerPwn (which was very poorly designed). The script will not touch any network configurations regarding ICS because it's assumed that the internet connection will be configured on the pineapple directly (3G Dongle, WiFi ICS on Pinepple, etc). I'm sure you can run the internet through your laptop with the normal Linux ICS script. Since Hak5 did such a great job making general operating much more user friendly I didn't feel it was necessary to include any ICS configuration in the script. Quote Link to comment Share on other sites More sharing options...
leg3nd Posted May 10, 2014 Author Share Posted May 10, 2014 (edited) Fixed a bug with DNS spoof's "spoofhosts" file location. On the newer firmware it was causing many of the attacks not to function properly. Please be sure you're running the latest firmware then update the script. ./jasagerPwn -u Also thinking about adding a client heart-bleed module here because I'm bored: https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/ssl/openssl_heartbleed.rb Anyone interested in that? Edited May 10, 2014 by leg3nd Quote Link to comment Share on other sites More sharing options...
toan3000 Posted July 2, 2014 Share Posted July 2, 2014 I'm really like your project. awesome! Quote Link to comment Share on other sites More sharing options...
toan3000 Posted July 2, 2014 Share Posted July 2, 2014 Fixed a bug with DNS spoof's "spoofhosts" file location. On the newer firmware it was causing many of the attacks not to function properly. Please be sure you're running the latest firmware then update the script. ./jasagerPwn -u Also thinking about adding a client heart-bleed module here because I'm bored: https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/ssl/openssl_heartbleed.rb Anyone interested in that? I'm using mark 5 , installed strip&inject infusion already and it's works great. But how can i inject into http traffic only? I don't want to mess https, it make client can't login some page (gmail, twitter ...). Have any method so i can inject to http only and not touch to https traffic? Thank's you so much! Quote Link to comment Share on other sites More sharing options...
Darren Kitchen Posted July 3, 2014 Share Posted July 3, 2014 Kudos! Looks great Leg3nd Quote Link to comment Share on other sites More sharing options...
johnjdoe Posted October 29, 2014 Share Posted October 29, 2014 Could somebody please explain to a newbie what's the goal / workings of this script and how to use it? It would be nice to have a little example step by step... ;-) Thank you in advance! Quote Link to comment Share on other sites More sharing options...
Genin Posted July 6, 2015 Share Posted July 6, 2015 Does anyone know why I might be getting this error message? /root/jasagerPwn-Reborn/jasagerPwn: 61: /root/jasagerPwn-Reborn/jasagerPwn: source: not found/root/jasagerPwn-Reborn/jasagerPwn: 62: /root/jasagerPwn-Reborn/jasagerPwn: main: not found I'm able to run the script after a fresh install on Kali, but when I close the script and try to reopen it nothing happens. I'm only able to get the above error message when running the script from the terminal using the 'sh' command. I tried removing the JasagerPwn directory and reinstalling it, but it won't even run the first time. I was able to run it after installing it on a Kali Live instance, but I would rather not have to go through the install process everytime I want to run the script :P My setup: Pineapple MkV Kali Linux 1.1.0a Thanks for your help! I really enjoy your script when I am able to run it :D Quote Link to comment Share on other sites More sharing options...
Genin Posted July 6, 2015 Share Posted July 6, 2015 Also this happens: ./jasagerPwn-Reborn -dbash: ./jasagerPwn-Reborn: Is a directory Quote Link to comment Share on other sites More sharing options...
Genin Posted August 1, 2015 Share Posted August 1, 2015 Ok so, upon closer inspection I no longer can get any shell scripts (.sh files) to run as executable. Ever since I tried installing Jasager on my Kali machine I am having to copy/paste (from .sh file straight into a terminal) from any scripts I have written myself I'm still learning how to use Linux so any help is greatly appreciated , does anyone have any suggestions? Quote Link to comment Share on other sites More sharing options...
Foxtrot Posted August 1, 2015 Share Posted August 1, 2015 try doing chmod +x ? Quote Link to comment Share on other sites More sharing options...
bytedeez Posted August 5, 2015 Share Posted August 5, 2015 Foxtrot might be on to something but it also sounds like you might have accidently deleted some necessary files needed to run scripts. Quote Link to comment Share on other sites More sharing options...
Genin Posted September 28, 2015 Share Posted September 28, 2015 Well I completely wiped my HD today and reinstalled Kali from USB. I am now running Kali 2.0 since they came out with the recent update. But I am still getting the same error I also tried the chmod +x with no effect. The only thing I can really think of that I did (after the clean install), besides run an update via apt-get, was to install and run the wp5.sh script from wifipineapple.com as per the instruction booklet. I was looking to share the internet connection from Kali to the pineapple. Any suggestions? Quote Link to comment Share on other sites More sharing options...
adamxk Posted September 28, 2015 Share Posted September 28, 2015 I'm but a noob. Is this a script or something seperate? D: Quote Link to comment Share on other sites More sharing options...
Genin Posted September 29, 2015 Share Posted September 29, 2015 (edited) Well I really don't know what to think now The Pineapple was a little buggy (not saving settings) so I reset it and formatted the SD card. So to recount I have entirely formatted the Pineapple and my laptop HD followed up with fresh installs of OS software. 2.4.0 Mark V Kali 2.0 as the only OS on the HDpreviously I ran a dual-boot with first Win8 and then Win10 I hated Windows, so I got rid of it I tried installing the script multiple times on live instances using both Kali 2.0 and the latest version of CrunchBang (running these instances off of USB drives). I ran chmod on the entire folder and each file that the error (line 61 & 62) indicates is missing. I tried it before making any changes to the files at all after downloading to a live instance. I tried it after double checking the changes I made to the settings file and making sure all the hardware is in place and ready to go. And I'm still getting the same error... (basically this is what it is, I took out the file folder structure): 61: source: not found62: main: not found Maybe it's my laptop? That would suck. Some Laptop Specs: Dell Inspiron I3541 AMD Quad-Core A6-6210 Processor 500GB Hard Drive 4GB RAM Should I try rolling back the pineapple firmware version to 1.0.0 and the OS ver to something earlier as well? I am finding it strange that the same error persists after I have wiped everything out and started from scratch like this. Especially because the first several times I ran the script I saw it work for a few brief moments and it was exciting to say the least I recently upgraded the pineapple's antennas (1 or 2 9dbi SMA dipole and/or the 16dbi Yagi) as well as added a powered long range booster to the external alfa card for the de-auth . So yeah, I am dying to get this script going in the lab! Edited September 29, 2015 by Genin Quote Link to comment Share on other sites More sharing options...
lostinmoscow Posted July 1, 2016 Share Posted July 1, 2016 On 10/19/2013 at 1:39 PM, leg3nd said: Has this been taken offline? I can't seem to be able to pull it down, I get 404 errors. Â Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.