Tag: Wifi Pineapple
This time on the show, funny WiFi names, MDK3 and non-violent protesting with an Occupineapple. Plus, what's the deal with the MK802? I'll be reviewing this little Android PC. All that and more this time on Hak5!
Traversing NAT firewalls couldn't be easier with a well crafted SSH proxy. This week Darren and Shannon break down reverse shells and persistence using a WiFi Pineapple and some autossh-fu. Plus, SSHFS GUIs for Linux, ClientAliveMaxCounts, Putty keys without Pageant and more!
This time on the show, the WiFi Pineapple gets a major revamp with Man-in-the-Middle tools and spiffy new web interface. Plus the best tools for EXT3 partition data recovery, Credit Card validation and simple Windows checksum tools. All that and more this time on Hak5!
So you’ve built, borrowed or bought a WiFi Pineapple and you’re new to OpenWRT and Jasager. Hopefully this guide will familiarize you with the many aspects of the the WiFi Pineapple. If you have specific questions please leave a comment or email email@example.com and we’ll try to keep this page updated.
This article will guide you through connecting to the WiFi Pineapple for the first time. For more in-depth how-to’s involving command line control, modules, using the white and black listing functions, sharing Internet access and more please consult the Jasager board on the Hak5 forums and keep an eye on the WiFi Pineapple category of the Hak5.org blog for future articles on these topics. (more…)
Hak5 911 – Circumvent Windows Login Security with a USB boot-drive, Phishing with a Pineapple and anonymous torrenting!
This time on the show we’re Breaking into Windows boxes with no skillz necessary using Konboot for USB, Spear-Phishing with a WiFi Pineapple, Sudo with pipes in Linux and downloading torrents anonymously
Hak5 910 – OpenWRT and WiFi Pineapple mods, Gmail 2-step verification, zScreen screencaptures, Image burning and MD5 hashes
This time on the show, the Gmail 2-step verification, the easiest screen shot utility in the world, Image burning, MD5 integrity verification and the auto-rickrolling pineapple of doom!
John Bebo’s Auto-Rickroll payload for the WiFi Pineapple is an excellent example of using Dnsmasq to forward targets to a hosted site. While this site could be malicious, perhaps hosing the Browser Exploitation Framework, Bebo’s payload is a safe and simple prank. Any web site a victim attempts to browse to brings them to a WiFi Pineapple hosted page containing Rick Astley ASCII Art and looping audio. It uses a similar technique employed by Captive Portals â€“ something we’ll explore in more detail soon â€“ except a lot more annoying. (more…)
While meeting up with family in Florida this week Darren takes on a WiFi Challenge using the airport friendly Pineapple Mark II and Airdrop-ng. Plus, Shannon has a follow-up to the Ultra Software including your picks.
Darren demonstrates a little man-in-the-middle attack using SSLStrip, an epic tool for removing that pesky encryption from your victims browsing session. Go from secure site to clear-text passwords in one simple step.
This time on the show Darren’s having a little man-in-the-middle fun with a demonstration os SSLStrip, an epic tool for removing that pesky encryption from your victims browsing session.
Booting Windows from a USB key using the Windows Automated Installation Kit. Unlocking the Fon and Installing Jasager — Illustrated. Desktop and meeting collaboration using DimDim, the free open source online collaboration software. Turn your Windows desktop into a 3D spaces cube, and more! [ MP4 | XviD | WMV ] (more…)
Episode 403 — Reverse Engineering, Graphical Firewall Configuration, Inside the pineapple: Jasager demo, and Remember the BBS?
Reverse Engineering in practice. Configuring Cisco, IPTables and other firewalls with a sweet graphical utility. A little nostalgia with the Hak5 BBS and cracking open the Pineapple, a demo of Jasager.
[ MP4 | XviD | WMV ]