Setup and Use the WiFi Pineapple Nano

Поделиться
HTML-код
  • Опубликовано: 26 ноя 2024

Комментарии • 48

  • @vancouverguy2533
    @vancouverguy2533 2 года назад +2

    You know, Boardman was actually a town I war drove like 20 years ago. When you had to modify linksys cards to take external ant. Then I upgraded to a big omni on the truck I had, an a 24dBi disc I had because i organized a group buy for the Personal Telco project in Portland back when I was at UW. My aunt actually lives there, is the Comptroller. Wasnt alot back then, but I used to always war drive from Pendleton to Portland once a month or so when we would drive back to visit family. Ran my laptop and wifi sniffing software everywhere i went.

    • @BrockRosen
      @BrockRosen  2 года назад

      Very cool! Glad to hear that people like you are proactively looking for security flaws. :)

  • @davidpierce9330
    @davidpierce9330 3 года назад +6

    Just so you know WPA 3 isn't really that much more secure than WPA 2.....probably help you to study and go take SEC+ to up your knowledge base

  • @vancouverguy2533
    @vancouverguy2533 2 года назад +1

    I have that modal, or something older thats identical. I bought mine at DEFCON 25 in 2017, along with every other single item the Hak5 booth sold. I was just looking at what they sold now, and didnt see any that looked like this. But this looks just like mine, same case and everything. I never even took my larger one out of the box, its still around here somewhere. Along with every LITERALLY every single other item for sale that year, that i pretty much didnt end up using much of any of it. Ya, i know, i have a gadget addiction.

    • @BrockRosen
      @BrockRosen  2 года назад

      I have a lot of Hak5 gear that I still need to get out and play with!

  • @rickyray2794
    @rickyray2794 3 года назад +3

    Might be easier to war drive with a Pwnagotchi, but both are fun. Also fun, in theory of course, to see how many people connect to your “guest wifi” on the pineapple

  • @BlueeBubble
    @BlueeBubble Год назад +1

    Did they discontinue the nano? 😭

  • @Krunch-ym3uf
    @Krunch-ym3uf 2 года назад +1

    Dope ass videos man.

  • @VampirusX
    @VampirusX 2 года назад

    Great presentation!
    9:00 I wonder, why you choose a german layout for a demonstration 😁

  • @MarcellJjr
    @MarcellJjr Год назад

    You might want to set it up before going into the field

  • @Chris-B-Chicken
    @Chris-B-Chicken 3 года назад +9

    well the signal of -92 is the least good one. the more to zero the besser - 0 is technically not possible, the nearest i know in my 10years network engineering career was -33 (like right in the Access-Point antenna) - no flex :)

  • @ModernCivilWar
    @ModernCivilWar 7 месяцев назад

    Finally some hands on video. Im new to this and this is much appreciated. U have discord. U clearly can teach. I have alot of questions. Let me know bud

  • @rayb5204
    @rayb5204 3 года назад +3

    Great video and very informative. Get permission from one of the business and odder them a free audit. Then you can show us the full hack and the capability of the WIFI Pineapple. Great job!

    • @BrockRosen
      @BrockRosen  3 года назад +1

      That would be a good idea!

  • @ModernCivilWar
    @ModernCivilWar 7 месяцев назад

    Also when in car are you uding hotspot? Is a lenovo t480 a good laptop for this? And cracking passwords etc? Or the lenovo legion i7?

  • @FREE_AT_LAST_SDK
    @FREE_AT_LAST_SDK 3 года назад +2

    hi there great video will u be doing any module video like sssplit and rick roll and stuff most info video are old thanks

    • @BrockRosen
      @BrockRosen  3 года назад

      Hello Nathan, I am open to suggestions!

  • @seanj1984
    @seanj1984 3 года назад +2

    You should get the mark VII with the mod so you can test both bands

    • @onmypurpose9054
      @onmypurpose9054 3 года назад +1

      Do you need to purchase a 5ghz adapter to hook to the Mark VII or is it just the MOD in the Pine AP suite that is necessary?

    • @seanj1984
      @seanj1984 3 года назад

      @@onmypurpose9054 It is a hardware mod that you purchase and add on. The radios on the MK VII only support the 2.4 Ghz band to my knowledge there is no soft mod to add 5Ghz support but if you find one please add on the github.

    • @BrockRosen
      @BrockRosen  3 года назад +1

      Now that sounds like a fun idea!

  • @1hung2lomofo84
    @1hung2lomofo84 3 года назад +3

    you could just use your own tools rather than relying on an AIO package to do it for you. so many people use these type of packages to label themselves security pros without knowing what its actually doing. that device is actually slower than a hunt and peck typist with a linux box

  • @npsmickabelieverinchrist8859
    @npsmickabelieverinchrist8859 2 года назад +1

    The hidden network was your pineapple, so 3 open is still poor security. Good video.

  • @aty4282
    @aty4282 3 года назад

    13:56 look at the buildings on the right and it looks like walking in night city with a low spec pc

  • @Qu0thTheRaven
    @Qu0thTheRaven 3 года назад +2

    be careful reporting security flaws to ppl most ppl dont take kindly to that

  • @onmypurpose9054
    @onmypurpose9054 3 года назад

    Brock awesome video! Do you have Cloud C2 installed or are you running it straight on metal?

    • @BrockRosen
      @BrockRosen  3 года назад +1

      Thanks, I am running it straight on metal.

  • @abcsforkids
    @abcsforkids 3 года назад +1

    Is there away to make a autorun usb drive to run with out enabling administrator like it does when you plug in your usb drive for your cordless keyboard and mouse. Is that even possible.... your the best technician hacker on RUclips... I've liked and subscribe/share. Please help. Thanks.

    • @BrockRosen
      @BrockRosen  3 года назад +1

      Do you know about the Hak5 USB Rubber Ducky. What you are describing is almost exactly what this device does. hak5.org/collections/sale/products/usb-rubber-ducky-deluxe They're currently sold out. But if you can get your hands on one you'll have some fun!

    • @def0rm0
      @def0rm0 3 года назад

      @@BrockRosen what about the bash bunny?

    • @BrockRosen
      @BrockRosen  3 года назад

      @@def0rm0 The Bash Bunny Mark II is out now! hak5.org/collections/sale/products/bash-bunny I personally haven't used it but there are videos out there ruclips.net/video/-UmvZdDxCiI/видео.html

  • @lindamarie9247
    @lindamarie9247 3 года назад +1

    Very interesting and so impressive. Great work!!

  • @oudsteve4483
    @oudsteve4483 3 года назад +1

    Thank you for posting bro 👍🏻 good job

  • @Ashphinchtersayswhat
    @Ashphinchtersayswhat 3 года назад

    It is Boardman

  • @samuraib0b
    @samuraib0b 3 года назад

    Pineapple Nano not a MK4

  • @oudsteve4483
    @oudsteve4483 3 года назад

    Excellent video

  • @seanj1984
    @seanj1984 3 года назад

    It's actually the nano

  • @Ashphinchtersayswhat
    @Ashphinchtersayswhat 3 года назад

    Is that boardman oregon?

    • @D_Z_AZ
      @D_Z_AZ 3 месяца назад

      Yes Morrow county

  • @oudsteve4483
    @oudsteve4483 3 года назад

    Wow bro excellent video

    • @JoseRodriguezFrio
      @JoseRodriguezFrio 3 года назад +1

      What did he actually do? browse nearby AP's?? didn't actually do anything or did I miss something

  • @hellofriend3091
    @hellofriend3091 3 года назад +2

    Security is a myth

  • @AbcXyz-rn2lz
    @AbcXyz-rn2lz 3 года назад +2

    Besides unpatched WPS, weak key bruting, unauth firmware RCE bugs, and social engineering there is no way to get into AES based WPA2 PSK. This guy is clueless he doesn't know some secret way to crack AES

    • @nathansforge
      @nathansforge 2 года назад

      its called hashcat. once the wpa handshake is captured then you can use hashcat to brute force the key

    • @AbcXyz-rn2lz
      @AbcXyz-rn2lz 2 года назад

      @@nathansforge hashcat is brute forcing and dictionary..... It's not exploiting anything and is 100% reliant on laziness. Most ISP stuff has RNG series added to a random word too, then isolation and PSK and TLS mitigation on most software after. LDAP is hardened too. Downgrade and compression stuff on TLS is long gone and browser RCE is too hard and monetized

  • @MarcellJjr
    @MarcellJjr Год назад

    disclaimer: DONT TRY THiS AT HOME!