Contact us if your question isn't found here or on the Hak5 forums.

Looking for a sold out product? Sign up for the Notification Widget on the product page to receive an email when we have more.




REAVER PRO

Please contact Tactical Network Solutions with any technical support questions you may have.
Q:
Does Reaver Pro work on an Apple Macbook?
A:
Mac's won't boot traditional USBs unless there's an EFI partition, which for Reaver Pro, there is not. That said if you're running VMWare Fusion, you can set up a VM using the plpbt.iso from http://www.plop.at/en/bootmanager/index.html. More information can be found here: http://communities.vmware.com/message/1110434.
Q:
My Reaver Pro pauses during bootup from the flashdrive / or quit working after a few tests.
A:
It may be running an old version of the Reaver Pro software. Contact us with your receipt for an upgraded version.


USB Rubber Ducky
Q:
Can you update the rubber ducky firmware by usb or will we need jtag interface?
A:
You can update it via USB- everything you need can be found at www.usbrubberducky.com!
Q:
How do I get the Micro SD Card out?
A:
This is for ALL USB Rubber Duckies now sold in the HakShop: The Micro SD card slot is made to hold the card very tightly against the board, thus so the card doesn't fall out or get lost. Overtime it will loosen to a more comfortable fit. I've found it easier to remove the tougher ones by pushing against the SD card from side to side (left to right, if the USB drive is sitting on a flat surface) until loosened, then pulling on the Micro SD card with my thumbnail against the small notch on the top of the card. This should help to remove the Micro SD Card enough that you'll be able to afix another finger under it and pull it out entirely.
Q:
Are there any restrictions on the SD card size?
A:
For now only regular SD cards up to 4GB. SDHC cards of 8GB have worked in the past but this is not on the official supported list for the firmware. Check with the USB Rubber Ducky forums for the latest.
Q:
Can the USB be used as a simple storage device?
A:
This feature is planned for the next version of the firmware, which has been outlined on the wiki at usbrubberducky.com
Q:
Is there a warranty on the USB Rubbery Ducky?
A:
We will replace and defective USB Rubber Ducky within 30 days of purchase. Please see our Return and Refund Policies for more information.
Q:
Why won't it mount when I plug the Ducky in?
A:
The ducky doesn't mount like your typical usb drive because it is not in fact a mass storage device - it's a HID (human interface device)!
Q:
The MicroSD card isn't being read by the USB Rubber Ducky. What's up?
A:
Try a different MicroSD card.
Q:
My rubber duck didn't have a slit in it to be used as a case. Is this a problem?
A:
No. We ship the rubber duck as is because some customers would rather use it as a bath buddy. If you want to use it as a case, simply make a one inch slit in the back behind the tail of the rubber duck with a knife or a box cutter. PLEASE BE CAREFUL!
Q:
Why isn't my duck yellow?
A:
The rubber duck is shipped in a variety of colors: yellow, orange, green, blue, purple, pink, or character versions. Please, no trade-ins.
Q:
My Ducky won't auto run. I have to press the button for it to run the inject.bin file.
A:
Try adding delay 2000 to the beginning of your ducky script in order to give the OS a moment to recognize the HID.

Q:
Are there any other published scripts besides the ones on the wiki?  I am interested in a script that would do the following:  Immediately dump the payload on the unsuspecting pc without bringing up a whole bunch of command prompts or windows which could alert an end user.  Ideally, the script would then flash a windows message that says something like, windows has just installed updates and requires a reboot before any additional work can be completed.  Once the user restarts windows, the script can run once the user logs back in or in the background somewhere during or after starting windows...   Any ideas on the feasibility of this?
A:
Additional Ducky Scripts are posted on the USB Rubber Ducky forums at forums.hak5.org. It sounds like for your particular use case the
shortest and simplest payload may suffice. "Powershell wget + execute", a 4 line Ducky Script, does just that -- downloads an executable and runs it in the background. Stay tuned to usbrubberducky.com for a soon-to-be-released online payload generator.
Q:
I have a question about the USB Rubber Ducky that isn't listed here. Who should I contact?
A:
Try www.USBRubberDucky.com for the answer. If it's not there, we also have a helpful forum with lots of problem solving. If that doesn't work, contact us and we'll try to help! Here is a copy of the official "QUACK" Start Guide Postcard Page 1 and Page 2!
Q:
What color should the LED be on the Ducky if it does/ does not have a Micro SD card in it?
A:
When you plug your Rubber Ducky into a windows machine without a Micro SD card, the LED should be red. If you plug the Ducky in WITH a Micro SD card, it should be red. Once a script is put on a Micro SD card and inserted into the USB Rubber Ducky, when the Ducky is plugged in, the light should be green. This will show you that the USB Rubber Ducky is reading that a script is on the Micro SD card. If the script does not run, try pressing the reset button on top of the Rubber Ducky. If this works, and you see your script, you may just need to add a delay in the script to get it working (see above). If none of the above works, try another Micro SD card. If this doesn't work, try another computer. If you are still have issues, return the Ducky to us within 60 days for an exchange or refund.
Pineapple Mark IV

Q:
I need help! Where do I go?
A:
We have several links to help you get started and use specific functions. First, read over this page. Many questions can be found here. Second, go to the Hak5 Forums and WifiPineapple.com for trouble shooting guides and updated firmware. If all else fails, we will accept exchanges and returns within 30 days. Read over our Return Policy (link at top of page) then contact us if you have any further questions.
When emailing us, if you're still stumped, please include any or all of the following info (thanks Mr-Protocol!):
  • Pineapple Hardware Version (ex: Mark III, Mark IV, etc.): 
  • Pineapple Software Version (ex: Shmoocon Beta, 1.0, etc.): 
  • OS used to connect to the pineapple:
  • Network layout of how your setup is connected (including IP information): 
  • All the tools/options that are running on the pineapple when the issue happened: 
  • Ping results from computer to pineapple: 
  • Is the problem repeatable (Yes/No): 
  • Steps taken which created the problem: 
  • Error Messages: 
  • Log file information: 
  • Anything else that was attempted to 'fix' the problem:
Q:
Is this legit? 
A:
Yes. The WiFi Pineapple is a specially hand crafted WiFi tool designed to aid penetration testers in vulnerability assessments where permission to do so has been granted. We have it on good authority that it has been used by various government agencies to aid in law enforcement. It complies with FCC regulations, is CE and ROHS certified, and does not harm baby seals. Check your local laws before attempting to use outside authorized environments. Hak5, LLC., Robin Wood, and those affiliated are not responsible for your actions.
Q: 
Do you sell EU AC adapters for the Pinapple? What voltage is the US wall plug that is included?
A:
We only have US wall adapters for the Wifi Pineapple 4, and the specs are as follows:
Model JF015WR-1200100UV
Input: 100-240V - 50/60Hz 0.5A
Output: 12V 1A
Efficiency Level V
The US Wall plug comes with every Wifi Pineapple 4 order and can be easily configured with an adapter for EU wall outlets. Please check your local retailers for specific configurations.
The WiFi Pineapple Mark IV accepts 5v - 12v at 500 mAh - 2000 mAh via its DC barrel port (2.1mm ID 5.5mm OD center positive). As such the WiFi Pineapple Mark IV can be powered via a computers USB port or most USB battery packs. The included AC/DC power supply, with US plugs, accepts 100-240V AC ~ 50/60 Hz 0.5A input and outputs 12V DC, 1A. The included AC/DC power supply is adaptable to other standards including UK, EU or AU plugs.
Q:
Will you be selling battery packs for the Wifi Pineapple 4? How much will it cost and what are the specs?
A:
Yes! They are available now via this page.

Q:
Weight and dimensions of the router?
A:
Weight is less than 1 lb. Dimensions are 3 cm depth, 10 cm height, and 8 cm width.

Q:
Can I flash my Wifi Pineapple II or III to the Mark IV firmware?
A:
The Mark III is the same hardware as the Mark II, so these linked video instructions and resources should help you upgrade to new firmware: forumsFind links under "Mark III". The new Mark IV firmware will not run on older router models.
Q:
I tried flashing my Wifi Pineapple Mark IV to the new firmware upgrade, and it gave me an error so I unplugged it and tried to restart. Now it's not working. What do I do?
A:
We specifically wrote on the update page "The error is expected, please be patient". The sysupgrade command that is issued by a php exec kills the httpd and thus the error, but the device is updating and will take 3-5 minutes to complete. Any interruption to the power during that time will effectively brick then unit. We'll have to do an exchange to get your pineapple back in working condition. Going forward we're looking at ways to make this message more prominent as we're learning that not everyone reads the instructions fully. We're happy to exchange your pineapple -- please make arrangements by contacting us after reading our Return Policy (link at top of page).
Q:
Can I use the factory reset button to clear everything that I have done to the device?
A:
On Wifi Pineapples running 1.0.1 firmware and above, the factory reset button will reset the configuration files to default, but it won't change any data you may be storing on pineapple.

Q:
Is it possible to set it up so that it piggybacks on another wifi network
A:
The Wifi Pineapple Mark IV has only 1 wifi radio in it, so it won't be able to piggyback. We're working on being able to link two pineapples together to do that, but it's a physical limitation of the hardware.
Q:
Do you have a Quick Start Guide?
A:
Yes! Here is a link to the PDF Quick Start Guide that is included with orders. This PDF is also available for purchase as a physical booklet.
Q:
Is there a warranty on the router?
A:
Yes, we can offer you a 30 day warranty on our Wifi Pineapple Mark IV router. If you find the Jasager script does not work or the router is damaged, or if you find you are not completely satisfied with the router, we will exchange or refund it upon request.
Q:
Is there a MAC tutorial?
A:
We do not have specific tutorials for MAC usage, but here is a forum post regarding using the pineapple with OSX: Forum Post.
Q:
What is the range of the Wifi Pineapple Mark IV?
A:
The router can be used up to 150 feet away from a target in a barrier free environment.
Q:
When I have Karma enabled it does not pick up any clients.  There is an error saying "KARMA is disabled when handling probe requests." What's up?
A:
The log file you're seeing is displayed in reverse order. Meaning the part the says KARMA_ENABLE supersedes the part that says KARMA is disabled. When clients connect their associations will be shown above this line.

Q:
Is the Wifi Pineapple Mark IV compatible with Mac OSX or do I need to use boot camp to run Windows or Linux to operate and exploit potential users who have granted me permission to exploit them?
A:
The WiFi pineapple is independent of OS and can be used with anything that has a TCP stack and a browser.
Q:
Can it proxy or otherwise create a client to access an existing wifi network at the same time?
A:
Proxy, yes, however the WiFi radio cannot be in both client and master mode at the same time. There has been some research on the topic -- switching back and forth -- but nothing substantial.
Q:
Does it support N or WPA 2?
A:
It does not support N. I know WPA can be configured, not positive about WPA2.
Q:
Will the Wifi Pineapple MK4 allow connections from devices that are probing for access points that they have connected to with encryption in the past? Or does the Wifi Pineapple only work on open networks?
A:
The wifi pineapple replies to all probe requests with a indistinguishable response that the ssid requested is available and open.  Depending on the operating system the device may or may not connect. Windows will not connect if it expects the AP to be encrypted. That said, any open network remembered will be probed for and thus replied to. The wifi pineapple isn't fool proof, but it is damn effective against a vast array of devices. I hope his answers your questions.
Q:
How do I get my Huawei 3G modem to work with the Wifi Pineapple?
A:
Here are three threads from the Jasager forums regarding Huawei modems:
http://forums.hak5.org/index.php?showtopic=26108&st=0&p=199697&hl=huawei&fromsearch=1&#entry199697
http://forums.hak5.org/index.php?showtopic=25984&st=0&p=198839&hl=huawei&fromsearch=1&#entry198839
http://forums.hak5.org/index.php?showtopic=26424&st=0&p=202010&hl=huawei&fromsearch=1&#entry202010
These should provide some insight. As long as you are able to modeswitch the modem it should be pretty straight forward. Also I recommend updating to the latest firmware as modems are added to the officially supported list as connection script snippets are written.

Q:
The Wifi Pineapple is telling me I'm out of space. Is this an error?
A:
The WiFi Pineapple has a failsafe built in to protect from just such issues. Here are the steps to resolving your issue:
1. Power on the pineapple
2. Wait 2-3 minutes
3. Hold the RESET button on the bottom of the unit for 5-10 seconds
4. Wait another 2-3 minutes
5. Connect via Ethernet to the PoE/LAN port as normal -- you will find that all settings have been restored to factory defaults.

Q:
Will the Pineapple recover passwords for WEP, WPA and WPA2 networks and report the password for each SSID when a client attempts to connect to it?
A:
While the WiFi Pineapple contains the Aircrack-NG suite, a set of tools purpose built for cracking said networks, this is not its primary function and currently there is no user friendly web front-end to accomplish this task. That may change in the future as modules are written by the community, however it is not the primary focus of the WiFi Pineapple.

Q:
What's the difference between the Wifi Pineapple and the Wireless ALFA Adapter?
A:
Technically speaking both the ALFA AWUS036H USB WiFi adapter and the WiFi Pineapple (powered by the ALFA AP51 platform) are both wireless radios and as such have similar capabilities, theoretically.
Practically speaking however the ALFA USB WiFi adapter is used as a client and the WiFi Pineapple is used as a server. The difference being one is a tool for joining a network and the other a tool for hosting a network. The WiFi Pineapple is a full computer running the OpenWRT build of Linux with our custom Jasager software providing easy access to WiFi attack tools. The ALFA USB WiFi adapter is not a computer and as such requires a host, such as a laptop, in order to operate. In the field you most commonly find the ALFA USB WiFi adapter used for site surveys (for example with Kismet), packet sniffing (with Airodump-ng), deauthentication and association attacks (with
Aireplay-ng or Airdrop-ng) and other such client side WiFi attacks using the Aircrack-ng suite. The ALFA USB WiFi adapter can be used to simulate a wireless access point similar to the WiFi Pineapple using tools like Airbase-ng or Karmetasploit, though their operation, unlike the WiFi Pineapple, is dependent on a host computer.
Q:
I can't get to the web interface or ping my Wifi Pineapple with any OS. What else can I do?
A:
Try setting a static IP addresses of 192.168.2.11 and see if you get ping replies from 192.168.2.1. Also try asking the forums for help as well at Hak5.org. If all else fails, we can offer an exchange or refund within 60 days of purchase.

Q:
Can aircrack / reaver be executed directly from the pineapple?
A:
Yes, both tools can be executed directly from the WiFi Pineapple. The Aircrack-ng suite is pre-installed and the Reaver open-source edition can be installed from the package manager with the command "opkg install reaver" or through the web interface using the opkgmanager module.

Q:
Without first getting the pass-phrase, can the pineapple do a mitm attack in a WPA scenario where WPS is disabled ?
A:
The WiFi Pineapple's Karma driver responds to probe requests with probe responses spoofing as an identically named (ESSID) *open* access point. Whether the client connects or not depends on the way the vendor has implemented WiFi in the device. For instance, older Windows XP machines may connect while Windows 7 may only associate then immediately disassociate. The same is true for mobile operating systems as iOS has been known to eventually give up on attempting WPA and connect to the open network. The WiFi Pineapple cannot spoof a WPA-PSK network as the key would need to be known beforehand in order to complete the 4-way handshake.
Q:
If plugged-in to corporate LAN, could I access remotely and monitor WiFi environment (access points nearby and/or probe requests)?
A:
Yes, either configure the WAN (eth1) port for DHCP or an unused static IP address on the target network. 
Q:
If plugged-in to corporate LAN, could I access remotely and run as Evil AP (masquerade as legit corp. WiFi and accept connections)?
A:
Yes, the WiFi Pineapple comes with autoSSH, a tool for maintaining persistent tunnels and management sessions, from which you are able to connect to the device and use its resources, including the wireless radio. 
Q:
If plugged-in to corporate LAN, could I access remotely and send deauth packets to specific APs / clients?
A:
Yes, the Aircrack-ng suite is included and can be used to perform deauth attacks.

Q:
I successfully upgraded to version 2.5.0. I tried to flash upgrade it to 2.7.0. I followed the instructions, unfortunately I can no longer log into the wifi pineapple. When I go to http://172.16.42.1/pineapple it just redirects me http://172.16.42.1/redirect.phpI tried to reset it to the factory default and I get the same results.
A:
Navigate to http://172.16.42.1:1471/ and you should be able to log in and use the Pineapple as normal.

Correction: Pages 17 and 19 of the Wifi Pineapple Booklet still contain references to "pointing your browser to http://172.16.42.1/pineapple". In actuality, "point your browser to http://172.16.42.1:1471".
UberTooth One

Q:
Does the UberTooth come with an Antenna?
A:
Yes, it does!

Q:
Will the UberTooth be covered in some sort of casing?
A:
As far as we know there are no plans for cases at this time, however I'm sure once they get into the hands of the hackers we'll start seeing some pretty unique housing solutions.

Q:
I ordered a Wifi Pineapple and an UberTooth One. Do they come together in the same package?
A:
Yes, they will come together.
Q:
Which micro controller is in the UberTooth One?
A:
LPC1756 FBC80
Q:
I need more information on the Ubertooth One. Details!
A:
The Ubertooth One is capable of monitoring on any Bluetooth channel. That means it will see communication going between two devices, even if they aren't broadcasting. It does not need to be paired with a device to see the traffic. The Ubertooth One covers the entire 2.4 GHz GSM band, from 2.4000 to 2.4835. It can be used for WiFi devices on the same frequency, such as those using 802.11b, g, and in some cases n, though for WiFi scanning we recommend the ALFA AWUS036NHA, which we also have in the HakShop. It can sniff a phone that is in standby mode, but it really depends on the configuration of the phone, the vendor, its software and other factors. For example, if it is paired with a bluetooth headset it is likely that some data will exchange, but at what interval while in standby I cannot determine. It does sniff the MAC address.
Wifi Adapter Alfa AWUS036H and AWUS036NHA
Q:
What segments are on the DVD (discontinued)?
A:
All segments are free to download via our site at hak5.org. Segments include: The Wifi 101 HakTip Series (The G Modes of Wireless; 802.11 Protocols; Channels and Interfaces; 802.11n and MIMO; 802.11 Frames; Beacon Frames and Injection; Frame Analyzing; Probe Requests and Responses), Standard Streams, Pipes with John the Ripper and AirCrackNG, Packet Sniffing 101 Promiscuous Mode, Media Access Control Fundamentals and Spoofing, Bash Math MacChanger and AirDriverNG, Packet Sniffing in all the Wrong Places, and Windows 7 SoftAP Setups.
Q:
What modes does this card support?  The specs say managed and monitor only.   It doesn't support all 6? 
A:
This card does not support all 6 modes.

Q:
Where can I download drivers from for this Alfa 036H?
A:
Drivers can be found at http://www.alfa.com.tw/download.php.
Q:
Which Alfa is which? 
A:
The easiest way to tell the two Alfa Wireless Adapters apart is by the labeling. The ALFA USB WiFi AWUS036H is matte black, while the ALFA USB WiFi AWUS036NHA is also matte black but says "Long Range Wifi Adapter 802.11b/g/n on the bottom.

Q: 
Which of the two Alfa usb wifi adapters is best suited for backtrack 5 R3?
A:
The AWUS036NHA is a newer product which uses an Atheros chipset, rather than the AWUS036H's Realtek. The 36H has wider support,
especially in older distributions, while the newer NHA model has been supported in BackTrack 5 since R2. The Atheros chipset offers all 6
modes of WiFi, where as the Realtek only 2 -- managed and monitor. Both can perform packet injection.

Q:
Where can I find drivers for the 036NHA Alfa?
A:
Q: My Alfa is a FAKE!
It isn't a fake. We take this very seriously. These are the same certified parts. From time to time this comes up because we have asked ALFA to provide us with parts in an inconspicuous looking logoless black (technically the term is "brandless"). We like the look of these over your traditional silver ALFA parts and hope you will do.
Mini Yagi
Q:
What is the range of the Mini Yagi 9dBi antenna?
A:
The mini Yagi is a 90 degree directional antenna providing 9dBi of gain. It cannot be measured in feet distance as it depends on the environment, however in my tests at 100 feet it offered 10 dBm higher signal strength versus the standard 5 dBi dipole antenna that ships with our Alfa awus036h.
 
 
 
Micro to Micro OTG Cable

Q:
What can this be used for?
A:
First of all you're not going to use this to charge one phone with another phone. When you connect devices to your usb host port on your tablets (ex) charging dock it's quite a different thing than connecting your device to another device as a peripheral storage or for an ADB connection via OTG cable. 
To understand, first is ADB and what ADB actually is and is used for. Second is the capabilities of the devices you're using and/ or how to use them. When you connect USB OTG Adapter to the phone it is switched into USB Host mode. Most phones and even tablets hardware is not capable of giving power to USB peripherals, so USB Cable or USB Hub with external power supply is required to connect USB peripherals to the phone.
Now normally (assuming your kernel has support built in for OTG host mode) when you connect a USB mass storage device to your phone via OTG cable it will automatically be mounted in /sdcard/usb/ or similar. However it may not auto-mount if other USB mass storage device already has automatically mounted partition. Then you may have to manually mount it by doing something like this for example.
"su
mkdir /sdcard/usb1 mount -t vfat -o rw,dirsync,nosuid,nodev,noexec,uid=1000,gid=1015,dmask=0702 /dev/block/sda1 /mnt/sdcard/usb1"
from the terminal emulator on the phone or via adb shell connection from another device. of course you can tell by the "su" that you're going to require root privileges.
This cable's main purpose is to run adb shell commands on a connected victim device. This is being used with a custom android framework and scripts to gain access to to sensitive data on another device.
https://github.com/kosborn/p2p-adb/
You can browse through the source and shell scripts there.
if you're not familiar with some of the android-sdk platform-tools like adb, and fastboot, or if you don't even know what kernel version or better yet even which android version your devices are running then this project and isn't something for you. Time to go back to square one and first learn about the different types of usb ports and what they can and cannot do.