olympus_mons Posted September 2, 2022 Share Posted September 2, 2022 (edited) Morning all, Has anyone got any experience with a Hak5 WiFi Pineapple? I have got the evil portal working but I am now interested in the rogue AP. Darren's video below is very good, but I feel like I am missing the point slightly. For example, he uses the Pineapple to capture SSIDs then re broadcast the SSIDs tricking Bob (the target) into thinking the SSIDs being broadcast by the Pineapple are the actual SSIDs. Towards the end of the video, it shows Bob successfully connects to the Pineapple. However, not once did Bob have to authenticate, Bob was just able to connect to the SSID being broadcast by the Pineapple. Darren goes on to mention how he can use Kali tools / Wireshark to analyse the traffic flowing from Bob, through the Pineapple to the internet. Maybe in the example the SSID did not have a password / PSK which is fine, but in a real engagement, it is very likely that the target SSID will have a password / PSK. I have clearly missed a key fundamental chunk of detail. Any help would be much appreciated. Edited September 2, 2022 by olympus_mons link change Quote Link to comment Share on other sites More sharing options...
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.