Skip to content

WiFi Pineapple Cheatsheet

WiFi Pineapple Cheatsheet

Overview

The WiFi Pineapple is a wireless auditing platform from Hak5 that allows penetration testers and security researchers to perform targeted man-in-the-middle attacks, advanced reconnaissance, and other WiFi-based attacks. It is a powerful tool for assessing the security of wireless networks.

Key Features

  • PineAP Suite: An advanced suite of tools for performing man-in-the-middle attacks.
  • Reconnaissance: Scan for and gather information about nearby wireless networks and clients.
  • Deauthentication Attacks: Disconnect clients from their wireless networks.
  • Evil Twin Attacks: Create a rogue access point to intercept traffic.
  • Captive Portals: Create a fake login page to capture credentials.
  • Cloud C2: Remotely manage your WiFi Pineapple from anywhere.

Common Attacks

  • Karma Attack: The WiFi Pineapple listens for probe requests from nearby devices and creates a fake access point with the same SSID, tricking the device into connecting.
  • PineAP Attack: A more advanced version of the Karma attack that allows for more granular control over the man-in-the-middle attack.
  • Deauthentication Attack: The WiFi Pineapple sends deauthentication frames to a client, forcing it to disconnect from its wireless network. This can be used to capture handshakes or to force the client to connect to a rogue access point.

Defensive Measures

  • Use a VPN: A VPN will encrypt your traffic, even if you are connected to a rogue access point.
  • Disable Auto-Connect: Disable the auto-connect feature on your devices to prevent them from automatically connecting to unknown wireless networks.
  • Be Wary of Open Networks: Be suspicious of open wireless networks, especially in public places.
  • Use a Firewall: A firewall can help to protect your device from attacks, even if you are connected to a malicious network.

Additional Resources