Jump to content

dustbyter

Active Members
  • Posts

    360
  • Joined

  • Last visited

  • Days Won

    7

Posts posted by dustbyter

  1. The purpose of this infusion is to get information about the client connecting to the pineapple. Specifically, the information gathered is about the browser plugins installed.

    You will need to set up the get database and install the iframe. Then when ever someone connects and tries to navigate through the browser, you will get the info described above.

  2. If your interested in seeing if an application is vulnerable to SSLStrip, fire up an HTTP proxy (like burp) and check the HTTP Response headers. If the respond contains a Strict-Transport-Security header, then the application is not going to work with SSLStrip.

    As mentioned above, most applications are now setting the HSTS header and thus this attack is not a viable one anymore.

  3. The pineapple can maintain various connections to devices that "think" they are connected to different access points.

    I don't believe that you will be able to have various channels set up unless you set up a card with a NIC for each channel. Each NIC is configured to work on a specific channel. Lastly, regarding the legality, you have to check the laws in your locale to confirm. In most cases this will not be legal unless everyone is made a ware that this is going on and they can opt out.

×
×
  • Create New...