BeNe Posted September 11, 2016 Share Posted September 11, 2016 Hello, i use the Nano in combination with my Nexus Nethunter device which is running beef on it. So i´m searching the best way to inject the hook.js. I tested the Pineapple´s Landingpage (because this is the perfect place for such a script) but it breaks the normal web surfing since only the landingpage is coming up and nothing else if i enable the landinpage. Is this normal ? If so, is there a way to add a redirect to the original url the client requested after the hook ? There was a module for the MarkV ("beef helper" and later the MiTM Module) but only for the old Fimrware Version. How do you inject the Beef´s hook.js on the pineapple ? Thanks for any hint´s Quote Link to comment Share on other sites More sharing options...
BeNe Posted September 15, 2016 Author Share Posted September 15, 2016 I´m still looking for a smart way to inject the hook.js in every http website! I tried some options on my Nethunter device (since there is no tool on the Nano itsself) with "mitmf" but it doesn´t work at all. Because the networf interface for the mobile options "rmnet0" doesn´t have a MAC-Address.So an arp spoof won´t work.I tested the dns spoof, but the client connects to the pineapple and the dns server is the pineapple itself no dns requests are spoofed behind the pineapple on the nethunter device. I tested also the responder module on the nano with a small modification for the HTMLtoInject part...but it was also not useable. Last ideas: Change the DHCP Server on the pineapple -> set the nethunter device as dns-server to fire up mitmf with dns spoof and inject the hook.js this way. Does anybody know where i can find the old MKv Modules (beef helpfer and mitm) to check how they worked ? Thanks! Quote Link to comment Share on other sites More sharing options...
Just_a_User Posted September 15, 2016 Share Posted September 15, 2016 MITM on WhistleMaster's github https://github.com/WhistleMaster/Pineapple-MK4/tree/master/2.8.1/mk4-module-mitm-1.3 1 Quote Link to comment Share on other sites More sharing options...
Whistle Master Posted September 27, 2016 Share Posted September 27, 2016 It's an old module, which will only work on 2.8.1 firmware unfortunately. Quote Link to comment Share on other sites More sharing options...
Rainman_34 Posted September 27, 2016 Share Posted September 27, 2016 I would use evil portal which allows them to be able to re-direct to the desired page after performing an action such as accept. Since beef unhooks after they leave your page I would setup a landing page which requires them to first click on a terms of use link which opens a modal window keeping them on the same page. Then only after that will the continue button appear. That helps keep them on the page for a bit longer to give you some time to use your hook. You can also make the button delay 15 seconds or so after the link has been clicked before it appears again giving you some more time. As far as being able to hook all HTTP sites I would look at editing packets as they go and include your code in that. Not the easiest thing but not sure of another way. Quote Link to comment Share on other sites More sharing options...
computa Posted September 30, 2016 Share Posted September 30, 2016 The computing power of the nano is not capable of handling b/ettercap mitmf multiple connections so you have to redirect http/s traffic onto your attacker machine to manipulate the traffic. Here is a good starting point: https://www.evilsocket.net/2016/09/15/WiFi-Pineapple-NANO-OS-X-and-BetterCap-setup/ Quote Link to comment Share on other sites More sharing options...
Rainman_34 Posted September 30, 2016 Share Posted September 30, 2016 Thanks for the great link computa. I agree though everything should really be done on a separate computer. The nano should really only be used for getting the clients on your network and then the separate computer should do all the hard work. The nano is great for minor things like evil portal or things like that. Quote Link to comment Share on other sites More sharing options...
computa Posted October 1, 2016 Share Posted October 1, 2016 Yeah all those wifi recon, beacon replay and access point creation things work like a charm with the nano. i am wondering why people want mitm/ettercap functionality directly on their pineapple because if a client is connected to your device you are allready MiTM, right? No need for arp spoofing the routes any more. With this ip.tables hack mentioned in the linked blog post @ evilsocket.net you can fully benefit of the power of your kali. My tests with bettercap and the integrated proxy, dns and sslstrip functionality were successful and reliable. We need a list of all ports that should get redirected to use all sniffing parsers of bettercap (FTP, Teamviewer, MySql, Irc, FTP, WhatsApp...) Quote Link to comment Share on other sites More sharing options...
BeNe Posted October 2, 2016 Author Share Posted October 2, 2016 I´m going to setup my Nano with my Nethunter Device (OnePlus One / Nexus 7) to stay mobile Should have enough power to mitm some clients. I can privide more infos when i´m done. Still have some problems with bettercap on it. Quote Link to comment Share on other sites More sharing options...
a2mx Posted January 18, 2021 Share Posted January 18, 2021 I try something similar, you can use DNS spoofing it acts like a race condition, it responds but the real dns register is faster, you can block with ip tables the response of real server by domain, and let the dnsspoofing module responds, this doesn't work in the moment you have to wait that cache of dns user timeout a send another dns query, takes some minutes Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.