Jump to content

Spoofing an AP with the correct WEP/WPA2 key ?


Recommended Posts

This question may have been asked already, but let's suppose we ran aircrack-ng, captured an AP's handshake and decoded it with hashcat and a good wordlist. Is there any way to spoof that AP with the correct password, other than using the Secure Management Access Point? And what if that AP is WEP-encrypted and we also have the key? Neither the Secure Mgmt AP or open AP on the Pineapple offer the possibility to broadcast an AP with a custom WEP key. After all, we get a list of detected access points in PineAP -- would it be conceivable to have an option that configures them with the correct key, if we have it?

Link to comment
Share on other sites

True, although in that case, only one encrypted AP may be spoofed at a time, no? Would it be possible to associate various encyption processes with different SSIDs simultaneously, in the way Karma works? Or is it just not possible?

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...