Jump to content

Rogue AP confusion...


Recommended Posts

Morning all,

Has anyone got any experience with a Hak5 WiFi Pineapple?

I have got the evil portal working but I am now interested in the rogue AP.

Darren's video below is very good, but I feel like I am missing the point slightly.


For example, he uses the Pineapple to capture SSIDs then re broadcast the SSIDs tricking Bob (the target) into thinking the SSIDs being broadcast by the Pineapple are the actual SSIDs. 

Towards the end of the video, it shows Bob successfully connects to the Pineapple. However, not once did Bob have to authenticate, Bob was just able to connect to the SSID being broadcast by the Pineapple. Darren goes on to mention how he can use Kali tools / Wireshark to analyse the traffic flowing from Bob, through the Pineapple to the internet.

Maybe in the example the SSID did not have a password / PSK which is fine, but in a real engagement, it is very likely that the target SSID will have a password / PSK.

I have clearly missed a key fundamental chunk of detail.

Any help would be much appreciated.

Edited by olympus_mons
link change
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
  • Create New...