WiFi Pineapple Cheatsheet
WiFi Pineapple Cheatsheet¶
Overview¶
The WiFi Pineapple is a wireless auditing platform from Hak5 that allows penetration testers and security researchers to perform targeted man-in-the-middle attacks, advanced reconnaissance, and other WiFi-based attacks. It is a powerful tool for assessing the security of wireless networks.
Key Features¶
- PineAP Suite: An advanced suite of tools for performing man-in-the-middle attacks.
- Reconnaissance: Scan for and gather information about nearby wireless networks and clients.
- Deauthentication Attacks: Disconnect clients from their wireless networks.
- Evil Twin Attacks: Create a rogue access point to intercept traffic.
- Captive Portals: Create a fake login page to capture credentials.
- Cloud C2: Remotely manage your WiFi Pineapple from anywhere.
Common Attacks¶
- Karma Attack: The WiFi Pineapple listens for probe requests from nearby devices and creates a fake access point with the same SSID, tricking the device into connecting.
- PineAP Attack: A more advanced version of the Karma attack that allows for more granular control over the man-in-the-middle attack.
- Deauthentication Attack: The WiFi Pineapple sends deauthentication frames to a client, forcing it to disconnect from its wireless network. This can be used to capture handshakes or to force the client to connect to a rogue access point.
Defensive Measures¶
- Use a VPN: A VPN will encrypt your traffic, even if you are connected to a rogue access point.
- Disable Auto-Connect: Disable the auto-connect feature on your devices to prevent them from automatically connecting to unknown wireless networks.
- Be Wary of Open Networks: Be suspicious of open wireless networks, especially in public places.
- Use a Firewall: A firewall can help to protect your device from attacks, even if you are connected to a malicious network.