Andrei0427 Posted July 19, 2012 Share Posted July 19, 2012 I was reading through one of stackexchange's child websites and searched 'wifi pineapple' for kicks to see what would come up. I came across this thread saying that the pineapple's radio transmissions could be easily tracks with some software or specialized hardware as indicate in the thread.. http://security.stackexchange.com/questions/10783/tracking-down-a-rogue-access-point this got me thinking as how to mitigate it as if one was to get caught, he would face jail time (obviously) much like this scenario: http://nakedsecurity.sophos.com/2012/07/16/seattle-cybercrime-trio-sentenced-for-3m-hacking-spree-via-wifi-and-malware/ Anyways, back to my point.. would be possible to setup a daemon that runs on the pineapple which is simply a bash script randomizing 'iwconfig wlan0 txpower XX' variables and applying them to the interface? At first it seems like the way to go but im not too sure about having the pineapple's cpu and interface hard at work the whole time changing the transmit power. Any thoughts on this? I can imagine that this could be easily created as an plugin, or 'infusions' as we call them here :) Regards, Andrei Quote Link to comment Share on other sites More sharing options...
Mr-Protocol Posted July 19, 2012 Share Posted July 19, 2012 Even with changing TX power, if they have a 3 point monitor they could still triangulate where you are based off of the dB differences between their 3 nodes. If they only had a single omni-directional node (like a laptop/Smart phone) trying to track you down, then modifying the TX power would make that much more difficult. Also: http://forums.hak5.o...t-6-read-first/ *** DISCLAIMER ***Jasager is a projected intended for the security professional. It can be a valuable tool for penetration testing or other such security auditing. We do not encourage using Jasager with malicious intent. As with any tools, this tool can be used for good or bad. Here are some of the good uses: In your office - Set it up to capture laptops before the bad guys do. Use a website to remind them of the rules. On penetration tests - Lure in target clients to find a back door into networks. At home - Have fun with neighbors who try to steal your WiFi bandwidth. http://cloud.wifipineapple.com/index.php?about WiFi Pineapple is a wireless penetration testing toolfor use in authorized security audits where permitted. Check laws and obtain client permission before using. Hak5, LLC., Darren Kitchen, Robin Wood, Rob Fuller, Sebastian Kinne and affiliates claim no responsability for unauthorized use. Please Hack Responsibly. Quote Link to comment Share on other sites More sharing options...
PineDominator Posted July 19, 2012 Share Posted July 19, 2012 I would change the mac of the wlan0 and maybe mon.wlan0? but I have had no succsess in changing the mac, from what i can tell there may be a couple things connected to the issue of changing the mac Quote Link to comment Share on other sites More sharing options...
Mr-Protocol Posted July 19, 2012 Share Posted July 19, 2012 I would change the mac of the wlan0 and maybe mon.wlan0? but I have had no succsess in changing the mac, from what i can tell there may be a couple things connected to the issue of changing the mac You can spoof the mac, but you would have to take interface down and up a lot which will drop connections. If it is a CISCO network, there are so many tools they have to pinpoint every device on the network if the proper setup was done. Quote Link to comment Share on other sites More sharing options...
PineDominator Posted July 19, 2012 Share Posted July 19, 2012 spoofing the mac messes with karma on the mk4 Quote Link to comment Share on other sites More sharing options...
Molotof Posted July 20, 2012 Share Posted July 20, 2012 Can we have the cooking material for building our own firmware please? Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.