TheNewH@cker975 Posted May 27, 2020 Share Posted May 27, 2020 So I tried using my Plunder Bug on my PC sniffing another PC and it is not showing up on Wireshark. I did try muting and unmuting the device via PowerShell and it still wouldn't show up Attached is a screen shot of Wireshark and my capture options Any ideas? Thanks Link to comment Share on other sites More sharing options...
TheNewH@cker975 Posted June 1, 2020 Author Share Posted June 1, 2020 I forgot to say I can access it via Powershell and run the script to mute it and unmute it. Link to comment Share on other sites More sharing options...
Skinny Posted June 16, 2020 Share Posted June 16, 2020 Are you running it on a Windows box or Linux? Link to comment Share on other sites More sharing options...
TheNewH@cker975 Posted June 16, 2020 Author Share Posted June 16, 2020 Windows....does it work automatically on Linux? Link to comment Share on other sites More sharing options...
Skinny Posted June 17, 2020 Share Posted June 17, 2020 No. I was just wondering why you have no other network interfaces showing up. Besides the plunder bug, do you have any other network interface available on the machine? Link to comment Share on other sites More sharing options...
Darren Kitchen Posted June 23, 2020 Share Posted June 23, 2020 It could be that the drivers aren't installed. They usually install automatically. What does device manager say? Link to comment Share on other sites More sharing options...
Struthian Posted July 18, 2020 Share Posted July 18, 2020 I had a very similar issue on Windows 10. Instead of running the powershell script, I used the alternative method of running ncpa.cpl. I then unchecked all the protocols for that ethernet adapter as was stated in the instructions. This was wrong and especially different from what the power shell script does. The PS script simply disables Internet Protocol Version 4 and Internet Protocol Version 6. (which forces some others to be disabled too). When I did *ONLY THAT* and then ran Wireshark "As Administrator" (which may not always be necessary) it worked just fine. Turns out that disabling Npcap protocol made the adapter invisible to wireshark. Another one - didn't examine further and don't know, keeps the plunder bug from working the second time it's connected. Interestingly, the Screen capture Hak5 uses in that instruction does not include NPcap in the list of protocols but does say "All of them". My recommendation is that in the instructions - just tell people to uncheck the two TCP protocols and leave the rest alone. Link to comment Share on other sites More sharing options...
Struthian Posted July 18, 2020 Share Posted July 18, 2020 PS - to remedy the issue, with plunderbug disconnected, go to "Device Manager", "Show hidden", go to "Network Adapters" and remove the Plunderbug one ASIX AX88772C ... then plug in the plunderbug again and do what I said in the prior post. (or use the powershell script) Link to comment Share on other sites More sharing options...
Recommended Posts
Archived
This topic is now archived and is closed to further replies.