Crossfire87 Posted June 6, 2014 Share Posted June 6, 2014 Hi there, I just received my Pineapple, flashing went well, I can connect etc. Sharing internet via utp on mac seems to be impossible these days but still. I have a question about my setup and if anyone has the same or tips on how to use it: 1: Macbook pro Vmware Kali linux 2. Extra Alfa wifi card (can monitor / inject) 3. Pineapple Mark V How would you use this setup, connect is, what would you run on your Pineapple and etc. I also have a 15000mah power source to bring the Pineapple with me on trips to have some fun ;) Please advice. Quote Link to comment Share on other sites More sharing options...
m40295 Posted June 6, 2014 Share Posted June 6, 2014 i would read tons of info on kali and each infusion on the mkv learn as much as you can then you will see its not about the end result its about the fun in finding your way thru on a path of your own i suggest reading and trying each tool till you find a mixture to your likings Quote Link to comment Share on other sites More sharing options...
Crossfire87 Posted June 6, 2014 Author Share Posted June 6, 2014 I agree, but there must be more users with both Kali and Pineapple that could tell me their experiences. Quote Link to comment Share on other sites More sharing options...
thesugarat Posted June 6, 2014 Share Posted June 6, 2014 I've got everything you have, plus some. There's too many variables. What do you want to do to people? MITM, phishing, Randomroll, crack WPS pins, collect 4 way handshakes for WPA networks to run against password lists.... Quote Link to comment Share on other sites More sharing options...
m40295 Posted June 6, 2014 Share Posted June 6, 2014 (edited) i can tell you about some experinces just not teach i use my kali setup running beef and use a mitm ettercap script to hook victim computer then on the pineapple i run karma for more victims and sslstrip for capturing user pass i use artimage for managing my payloads and exploits this setup works most of the time tho i had to do some configuring to gel metasploit and beef together something i also do is netcat my log files to my laptop for quick look at them in a terminal window all learned thru forums trial and error with that said i own many computers to be used as victims as i do not have written permission to pentest my nabors so i blacklist there mac Edited June 6, 2014 by m40295 Quote Link to comment Share on other sites More sharing options...
Crossfire87 Posted June 7, 2014 Author Share Posted June 7, 2014 Thanks you for this information, this is more in the direction I was looking for ;) Quote Link to comment Share on other sites More sharing options...
m40295 Posted June 7, 2014 Share Posted June 7, 2014 some people expect to be givin the anwsers when most of us enjoy fumbeling around till we find the anwsers glad i could help Quote Link to comment Share on other sites More sharing options...
Crossfire87 Posted June 9, 2014 Author Share Posted June 9, 2014 Very true, thank you for pointing me in the right direction. Quote Link to comment Share on other sites More sharing options...
Crossfire87 Posted June 10, 2014 Author Share Posted June 10, 2014 So what i've been doing, running Karma, sslstrip and some other things. People connect, I check the logs all works fine. Now, what would be advisable to use (in Kali for example) to export the log files to and to "manage" them, there is a lot of clutter. I would just like to index important data. Just a few names of programs will do, the use of which I will educate myself via tutorials etc. Quote Link to comment Share on other sites More sharing options...
Crossfire87 Posted June 29, 2014 Author Share Posted June 29, 2014 bump, anyone that did not read this thread yet and can (and is willing) to answer my questions? It would be very welcome. Quote Link to comment Share on other sites More sharing options...
m40295 Posted June 29, 2014 Share Posted June 29, 2014 check out the new infusion meterpreter is a blessing play with that it opens a plethora of doors a user on here killerwinx i think has a cool http logging setup i belive he shared Quote Link to comment Share on other sites More sharing options...
Darren Kitchen Posted July 3, 2014 Share Posted July 3, 2014 What are you trying to do with the log files? You say there is a lot of clutter. You're also using Kali? Nice thing about Linux is the plethora of text processing tools especially suited for log files. Are you familiar with sed, awk, grep, uniq, cut? I'm not sure your skill level or what you're trying to achieve but perhaps you could find some value from the various tutorials, including http://www.offensive-security.com/metasploit-unleashed/Main_Page Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.