DramaKing Posted August 6, 2022 Share Posted August 6, 2022 (edited) I've been experimenting with the new "Impersonate all networks" feature of the 2.0.0 firmware. I have PineAP set to Advanced, the impersonate slider turned on, checked "Capture SSIDs to pool" and "Broadcast SSID pool, " and enabled "Capture Handshakes" for Evil WPA. It all seems to work, but the handshakes are captured with a PineAP_WPA ESSID, which is worthless. I also highly doubt that devices are trying to connect to that name. Am I doing something wrong, or is this a work-in-progress that can be fixed? If the Pineapple remembers the MAC of the station that generated a specific probe request that added an SSID to the pool, and then the station attempted to authenticate, couldn't it add the relevant beacon frames to the capture files? Edited August 6, 2022 by DramaKing Corrected AP name Quote Link to comment Share on other sites More sharing options...
DramaKing Posted August 16, 2022 Author Share Posted August 16, 2022 Figured out a partial solution. Captured screenshots of the Previous Clients screen, ran them through OCR to convert to spreadsheets, and now I can correlate MAC addresses to the SSID that they connected or tried to connect to. All I have to do now is figure out some way to edit the pcaps. Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.