ℳ∂Ʋς Posted May 11, 2015 Share Posted May 11, 2015 This question may have been asked already, but let's suppose we ran aircrack-ng, captured an AP's handshake and decoded it with hashcat and a good wordlist. Is there any way to spoof that AP with the correct password, other than using the Secure Management Access Point? And what if that AP is WEP-encrypted and we also have the key? Neither the Secure Mgmt AP or open AP on the Pineapple offer the possibility to broadcast an AP with a custom WEP key. After all, we get a list of detected access points in PineAP -- would it be conceivable to have an option that configures them with the correct key, if we have it? Quote Link to comment Share on other sites More sharing options...
barry99705 Posted May 11, 2015 Share Posted May 11, 2015 You would just set up the access point from the command line. Quote Link to comment Share on other sites More sharing options...
ℳ∂Ʋς Posted May 12, 2015 Author Share Posted May 12, 2015 True, although in that case, only one encrypted AP may be spoofed at a time, no? Would it be possible to associate various encyption processes with different SSIDs simultaneously, in the way Karma works? Or is it just not possible? Quote Link to comment Share on other sites More sharing options...
barry99705 Posted May 12, 2015 Share Posted May 12, 2015 Not automagically. You can create different virtual APs though. That's how it's usually done with normal access points. You'll probably run out of processing power pretty quick though. Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.