Jump to content

Rogue AP confusion...


Recommended Posts

Morning all,

Has anyone got any experience with a Hak5 WiFi Pineapple?

I have got the evil portal working but I am now interested in the rogue AP.

Darren's video below is very good, but I feel like I am missing the point slightly.


For example, he uses the Pineapple to capture SSIDs then re broadcast the SSIDs tricking Bob (the target) into thinking the SSIDs being broadcast by the Pineapple are the actual SSIDs. 

Towards the end of the video, it shows Bob successfully connects to the Pineapple. However, not once did Bob have to authenticate, Bob was just able to connect to the SSID being broadcast by the Pineapple. Darren goes on to mention how he can use Kali tools / Wireshark to analyse the traffic flowing from Bob, through the Pineapple to the internet.

Maybe in the example the SSID did not have a password / PSK which is fine, but in a real engagement, it is very likely that the target SSID will have a password / PSK.

I have clearly missed a key fundamental chunk of detail.

Any help would be much appreciated.

Link to comment
Share on other sites


This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
  • Create New...