You know, Boardman was actually a town I war drove like 20 years ago. When you had to modify linksys cards to take external ant. Then I upgraded to a big omni on the truck I had, an a 24dBi disc I had because i organized a group buy for the Personal Telco project in Portland back when I was at UW. My aunt actually lives there, is the Comptroller. Wasnt alot back then, but I used to always war drive from Pendleton to Portland once a month or so when we would drive back to visit family. Ran my laptop and wifi sniffing software everywhere i went.
I have that modal, or something older thats identical. I bought mine at DEFCON 25 in 2017, along with every other single item the Hak5 booth sold. I was just looking at what they sold now, and didnt see any that looked like this. But this looks just like mine, same case and everything. I never even took my larger one out of the box, its still around here somewhere. Along with every LITERALLY every single other item for sale that year, that i pretty much didnt end up using much of any of it. Ya, i know, i have a gadget addiction.
Might be easier to war drive with a Pwnagotchi, but both are fun. Also fun, in theory of course, to see how many people connect to your “guest wifi” on the pineapple
well the signal of -92 is the least good one. the more to zero the besser - 0 is technically not possible, the nearest i know in my 10years network engineering career was -33 (like right in the Access-Point antenna) - no flex :)
Finally some hands on video. Im new to this and this is much appreciated. U have discord. U clearly can teach. I have alot of questions. Let me know bud
Great video and very informative. Get permission from one of the business and odder them a free audit. Then you can show us the full hack and the capability of the WIFI Pineapple. Great job!
@@onmypurpose9054 It is a hardware mod that you purchase and add on. The radios on the MK VII only support the 2.4 Ghz band to my knowledge there is no soft mod to add 5Ghz support but if you find one please add on the github.
you could just use your own tools rather than relying on an AIO package to do it for you. so many people use these type of packages to label themselves security pros without knowing what its actually doing. that device is actually slower than a hunt and peck typist with a linux box
Is there away to make a autorun usb drive to run with out enabling administrator like it does when you plug in your usb drive for your cordless keyboard and mouse. Is that even possible.... your the best technician hacker on RUclips... I've liked and subscribe/share. Please help. Thanks.
Do you know about the Hak5 USB Rubber Ducky. What you are describing is almost exactly what this device does. hak5.org/collections/sale/products/usb-rubber-ducky-deluxe They're currently sold out. But if you can get your hands on one you'll have some fun!
@@def0rm0 The Bash Bunny Mark II is out now! hak5.org/collections/sale/products/bash-bunny I personally haven't used it but there are videos out there ruclips.net/video/-UmvZdDxCiI/видео.html
Besides unpatched WPS, weak key bruting, unauth firmware RCE bugs, and social engineering there is no way to get into AES based WPA2 PSK. This guy is clueless he doesn't know some secret way to crack AES
@@nathansforge hashcat is brute forcing and dictionary..... It's not exploiting anything and is 100% reliant on laziness. Most ISP stuff has RNG series added to a random word too, then isolation and PSK and TLS mitigation on most software after. LDAP is hardened too. Downgrade and compression stuff on TLS is long gone and browser RCE is too hard and monetized
You know, Boardman was actually a town I war drove like 20 years ago. When you had to modify linksys cards to take external ant. Then I upgraded to a big omni on the truck I had, an a 24dBi disc I had because i organized a group buy for the Personal Telco project in Portland back when I was at UW. My aunt actually lives there, is the Comptroller. Wasnt alot back then, but I used to always war drive from Pendleton to Portland once a month or so when we would drive back to visit family. Ran my laptop and wifi sniffing software everywhere i went.
Very cool! Glad to hear that people like you are proactively looking for security flaws. :)
Just so you know WPA 3 isn't really that much more secure than WPA 2.....probably help you to study and go take SEC+ to up your knowledge base
I have that modal, or something older thats identical. I bought mine at DEFCON 25 in 2017, along with every other single item the Hak5 booth sold. I was just looking at what they sold now, and didnt see any that looked like this. But this looks just like mine, same case and everything. I never even took my larger one out of the box, its still around here somewhere. Along with every LITERALLY every single other item for sale that year, that i pretty much didnt end up using much of any of it. Ya, i know, i have a gadget addiction.
I have a lot of Hak5 gear that I still need to get out and play with!
Might be easier to war drive with a Pwnagotchi, but both are fun. Also fun, in theory of course, to see how many people connect to your “guest wifi” on the pineapple
Did they discontinue the nano? 😭
Dope ass videos man.
Great presentation!
9:00 I wonder, why you choose a german layout for a demonstration 😁
You might want to set it up before going into the field
well the signal of -92 is the least good one. the more to zero the besser - 0 is technically not possible, the nearest i know in my 10years network engineering career was -33 (like right in the Access-Point antenna) - no flex :)
Finally some hands on video. Im new to this and this is much appreciated. U have discord. U clearly can teach. I have alot of questions. Let me know bud
Great video and very informative. Get permission from one of the business and odder them a free audit. Then you can show us the full hack and the capability of the WIFI Pineapple. Great job!
That would be a good idea!
Also when in car are you uding hotspot? Is a lenovo t480 a good laptop for this? And cracking passwords etc? Or the lenovo legion i7?
hi there great video will u be doing any module video like sssplit and rick roll and stuff most info video are old thanks
Hello Nathan, I am open to suggestions!
You should get the mark VII with the mod so you can test both bands
Do you need to purchase a 5ghz adapter to hook to the Mark VII or is it just the MOD in the Pine AP suite that is necessary?
@@onmypurpose9054 It is a hardware mod that you purchase and add on. The radios on the MK VII only support the 2.4 Ghz band to my knowledge there is no soft mod to add 5Ghz support but if you find one please add on the github.
Now that sounds like a fun idea!
you could just use your own tools rather than relying on an AIO package to do it for you. so many people use these type of packages to label themselves security pros without knowing what its actually doing. that device is actually slower than a hunt and peck typist with a linux box
The hidden network was your pineapple, so 3 open is still poor security. Good video.
13:56 look at the buildings on the right and it looks like walking in night city with a low spec pc
be careful reporting security flaws to ppl most ppl dont take kindly to that
Brock awesome video! Do you have Cloud C2 installed or are you running it straight on metal?
Thanks, I am running it straight on metal.
Is there away to make a autorun usb drive to run with out enabling administrator like it does when you plug in your usb drive for your cordless keyboard and mouse. Is that even possible.... your the best technician hacker on RUclips... I've liked and subscribe/share. Please help. Thanks.
Do you know about the Hak5 USB Rubber Ducky. What you are describing is almost exactly what this device does. hak5.org/collections/sale/products/usb-rubber-ducky-deluxe They're currently sold out. But if you can get your hands on one you'll have some fun!
@@BrockRosen what about the bash bunny?
@@def0rm0 The Bash Bunny Mark II is out now! hak5.org/collections/sale/products/bash-bunny I personally haven't used it but there are videos out there ruclips.net/video/-UmvZdDxCiI/видео.html
Very interesting and so impressive. Great work!!
Thank you for posting bro 👍🏻 good job
It is Boardman
Pineapple Nano not a MK4
Excellent video
It's actually the nano
Is that boardman oregon?
Yes Morrow county
Wow bro excellent video
What did he actually do? browse nearby AP's?? didn't actually do anything or did I miss something
Security is a myth
truth
Besides unpatched WPS, weak key bruting, unauth firmware RCE bugs, and social engineering there is no way to get into AES based WPA2 PSK. This guy is clueless he doesn't know some secret way to crack AES
its called hashcat. once the wpa handshake is captured then you can use hashcat to brute force the key
@@nathansforge hashcat is brute forcing and dictionary..... It's not exploiting anything and is 100% reliant on laziness. Most ISP stuff has RNG series added to a random word too, then isolation and PSK and TLS mitigation on most software after. LDAP is hardened too. Downgrade and compression stuff on TLS is long gone and browser RCE is too hard and monetized
disclaimer: DONT TRY THiS AT HOME!