ShitLord666 Posted June 27, 2023 Share Posted June 27, 2023 I doubt I will encounter this myself, but if someone used a wifi pineapple on me or my business, can I identify who it is? How would they try to mask their identity? And what would be the best way to prevent it and/or reveal the attacker? Link to comment Share on other sites More sharing options...
dark_pyrro Posted June 27, 2023 Share Posted June 27, 2023 It's really difficult to answer without knowing anything about the business IT setup. It's a lot of "it depends" in a more generic answer and therefore kinda meaningless. It needs to be more specific to be relevant. Identifying someone using a Pineapple will be a challenge if someone on the threat actor side isn't doing some mistake or that the blue team within the organization has a large amount of resources (but that alone is no recipe for success either). Link to comment Share on other sites More sharing options...
DramaKing Posted June 27, 2023 Share Posted June 27, 2023 You identify a Pineapple like any rogue WAP. A wireless IPS is especially good at this, especially if active attacks are being run. Then you track it down by the signal. Link to comment Share on other sites More sharing options...
Recommended Posts
Archived
This topic is now archived and is closed to further replies.