Jump to content

Search the Community

Showing results for tags 'evil twin'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • WiFi Pineapple
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapple University
    • WiFi Pineapples Mark I, II, III
  • Hak5 Gear
    • Hak5 Cloud C²
    • Bash Bunny
    • Packet Squirrel
    • LAN Turtle
    • USB Rubber Ducky
    • Plunder Bug
  • Hak5 Shows
    • Hak5
    • HakTip
    • Metasploit Minute
    • Threatwire
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 2 results

  1. So I have just got my WiFi Pineapple Nano and been playing around with it for a couple of days. I can see the option of creating an open rogue AP. But what I want to do is to create one with a WPA2 password, so it becomes more convincing for potentials victims to connect. Also to impersonate office environments where I already know the WPA2 password. I don't really see any option for doing so in the GUI, nor do I see it in any of the modules. I am wondering if it is at all possible to do so?
  2. All, I have a wireless client that will only connect to a specific SSID and MAC address on the 5Ghz band. I configured the SSID into the PineAP pool but the wireless device is not connecting to the SSID I set. I know this because I see the probe request from it in the logs that matches my SSID pool. I can only assume it's because of the MAC address and also perhaps PineAP is not doing this over the 5Ghz band. I set the MAC address it expects in the SOURCE MAC field of PineAP. I presume that since it still isn't working, that this field isn't what I think it's for. Can someone tell me how to configure this to work? Is it possible to change the MAC address of the Nano + PineAP like you would in say, airbase-ng to spoof the MAC address that the client is looking for and to also tell PineAP what band/channel to listen on? NOTE: Yes, this is a sanctioned penetration test and not illegitimate.
×
×
  • Create New...