olympus_mons Posted September 1, 2022 Share Posted September 1, 2022 Hi all, I bought a Pineapple a few months back, I managed to get the captive portal feature working, but I never managed to get the rogue access point working. I am due onsite to do some pen testing in a few weeks and I would like to incorporate the Pineapple in the wireless testing if possible. Up to now, I have used tool such as airgedden and aircrack-ng but the Pineapple feels like a better more professional tool. Can anyone please run through the work flow of how to configure a rogue access point please? Is the rogue access point the same as an evil ap? Essentially I want to trick the users into connecting to my Pineapple / Rogue AP / Evil AP and ultimately steal the WiFi password. Is this possible? Thanks in advance. Quote Link to comment Share on other sites More sharing options...
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.