ShitLord666 Posted June 27 Share Posted June 27 I doubt I will encounter this myself, but if someone used a wifi pineapple on me or my business, can I identify who it is? How would they try to mask their identity? And what would be the best way to prevent it and/or reveal the attacker? Quote Link to comment Share on other sites More sharing options...
dark_pyrro Posted June 27 Share Posted June 27 It's really difficult to answer without knowing anything about the business IT setup. It's a lot of "it depends" in a more generic answer and therefore kinda meaningless. It needs to be more specific to be relevant. Identifying someone using a Pineapple will be a challenge if someone on the threat actor side isn't doing some mistake or that the blue team within the organization has a large amount of resources (but that alone is no recipe for success either). Quote Link to comment Share on other sites More sharing options...
DramaKing Posted June 27 Share Posted June 27 You identify a Pineapple like any rogue WAP. A wireless IPS is especially good at this, especially if active attacks are being run. Then you track it down by the signal. Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.