Page 2 of 2 FirstFirst 12
Results 11 to 15 of 15

Thread: Pwnstar9.0 for Kali-linux 2016R1-2 released for testing

  1. #11
    Senior Member
    Join Date
    Jul 2013
    Posts
    806
    To JackBauer

    You can setup an access point but it would not be protected by WPA or WEP. Just use selection three not 4 or 9a as you do not need to login in thru a web page. If you understand both bash coding and airbase-ng commands we think you could encrypt the airbase-ng with WEP BUT have it transmit that it is WPA. That would confuse a hacker to some extent. Notice our RogueAP WPA Clone used to passive DDOS a target transmits that it is WPA encrypted. We ran some tests years back with this WEP/WPA concept .


    MTeams

  2. #12
    Junior Member
    Join Date
    Jul 2013
    Location
    Australia
    Posts
    2
    Hi Guys i have playing with the latest version i have set up Rogue AP Name = ZZZ Blackhole but has a different name DIRECT -oQF3 etc
    why is that ?

    XAM

  3. #13
    Senior Member
    Join Date
    Jul 2013
    Posts
    806
    To maxwell8686

    When you select the type of airbase-ng to set up there are three(3) types. You have selected type three(3) which responds to all probes. Just select type 2 and you will only broadcast the essid or rogueAP name you require.

    Furthermore if you select type three(3) or possibly type one(1) you will also end up with a second rogueAP name called default.

    Musket Teams

  4. #14
    Member
    Join Date
    Mar 2013
    Posts
    74
    Can this one help to sniff https logins?

    Was thinking as sslstrip doesn't work (all using now HSTS) to let the user connect to a rogue AP and from there trick him to login to an https site and get the credentials .... ?

  5. #15
    Senior Member
    Join Date
    Jul 2013
    Posts
    806
    To: pamamolf

    Pwnstar9 supports MITMf and sslslip, sslslip+ and sslstrip. Setup pwnstar9 to use Item 3 in the basic menu

    You might try the beef package in airgeddon available for download here in Community Projects. MTeams cannot test as our receivers do not work with airgeddon.


    Musket Teams
    Last edited by mmusket33; 2017-04-26 at 11:37 AM.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •