Search the Community
Showing results for tags 'evil twin'.
Found 3 results
I was testing evil twin attack on my laptop using one wireless adapter. I ran it on airmegaddon and while I have successfully created a rogue AP, my laptop can't connect to the AP. It failed numerously. Is there a way to get connected to the AP that I have created?
So I have just got my WiFi Pineapple Nano and been playing around with it for a couple of days. I can see the option of creating an open rogue AP. But what I want to do is to create one with a WPA2 password, so it becomes more convincing for potentials victims to connect. Also to impersonate office environments where I already know the WPA2 password. I don't really see any option for doing so in the GUI, nor do I see it in any of the modules. I am wondering if it is at all possible to do so?
All, I have a wireless client that will only connect to a specific SSID and MAC address on the 5Ghz band. I configured the SSID into the PineAP pool but the wireless device is not connecting to the SSID I set. I know this because I see the probe request from it in the logs that matches my SSID pool. I can only assume it's because of the MAC address and also perhaps PineAP is not doing this over the 5Ghz band. I set the MAC address it expects in the SOURCE MAC field of PineAP. I presume that since it still isn't working, that this field isn't what I think it's for. Can someone tell me how to configure this to work? Is it possible to change the MAC address of the Nano + PineAP like you would in say, airbase-ng to spoof the MAC address that the client is looking for and to also tell PineAP what band/channel to listen on? NOTE: Yes, this is a sanctioned penetration test and not illegitimate.