Jump to content

Capturing Handshakes with ESSIDs Using Impersonate All Networks


DramaKing

Recommended Posts

I've been experimenting with the new "Impersonate all networks" feature of the 2.0.0 firmware. I have PineAP set to Advanced, the impersonate slider turned on, checked "Capture SSIDs to pool" and "Broadcast SSID pool, " and enabled "Capture Handshakes" for Evil WPA. It all seems to work, but the handshakes are captured with a PineAP_WPA ESSID, which is worthless. I also highly doubt that devices are trying to connect to that name. Am I doing something wrong, or is this a work-in-progress that can be fixed? If the Pineapple remembers the MAC of the station that generated a specific probe request that added an SSID to the pool, and then the station attempted to authenticate, couldn't it add the relevant beacon frames to the capture files?

Link to comment
Share on other sites

  • 2 weeks later...

Figured out a partial solution. Captured screenshots of the Previous Clients screen, ran them through OCR to convert to spreadsheets, and now I can correlate MAC addresses to the SSID that they connected or tried to connect to. All I have to do now is figure out some way to edit the pcaps.

Link to comment
Share on other sites

Archived

This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...