Jump to content

Capturing Handshakes with ESSIDs Using Impersonate All Networks


Recommended Posts

I've been experimenting with the new "Impersonate all networks" feature of the 2.0.0 firmware. I have PineAP set to Advanced, the impersonate slider turned on, checked "Capture SSIDs to pool" and "Broadcast SSID pool, " and enabled "Capture Handshakes" for Evil WPA. It all seems to work, but the handshakes are captured with a PineAP_WPA ESSID, which is worthless. I also highly doubt that devices are trying to connect to that name. Am I doing something wrong, or is this a work-in-progress that can be fixed? If the Pineapple remembers the MAC of the station that generated a specific probe request that added an SSID to the pool, and then the station attempted to authenticate, couldn't it add the relevant beacon frames to the capture files?

Edited by DramaKing
Corrected AP name
Link to comment
Share on other sites

  • 2 weeks later...

Figured out a partial solution. Captured screenshots of the Previous Clients screen, ran them through OCR to convert to spreadsheets, and now I can correlate MAC addresses to the SSID that they connected or tried to connect to. All I have to do now is figure out some way to edit the pcaps.

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
  • Create New...