ℳ∂Ʋς Posted May 11, 2015 Share Posted May 11, 2015 This question may have been asked already, but let's suppose we ran aircrack-ng, captured an AP's handshake and decoded it with hashcat and a good wordlist. Is there any way to spoof that AP with the correct password, other than using the Secure Management Access Point? And what if that AP is WEP-encrypted and we also have the key? Neither the Secure Mgmt AP or open AP on the Pineapple offer the possibility to broadcast an AP with a custom WEP key. After all, we get a list of detected access points in PineAP -- would it be conceivable to have an option that configures them with the correct key, if we have it? Quote Link to comment Share on other sites More sharing options...
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.