Saturday, September 7, 2019
What is a wireless pineapple and how does it work Essay
What is a wireless pineapple and how does it work - Essay Example akes the attacker capable of pulling a number of tricks.Wifi Pineapple Mark V is Equipped with 2 radios it can work in client mode meaning it can piggyback on a nearby WiFi network and bridge the victims connections .Hak5 focuses on making easily accessible, affordable and infinitely expandable wireless hacking tools. Since 2008 the WiFi Pineapple has been serving penetration testers, law enforcement, military and government with a versatile wireless auditing platform for almost any deployment scenario.â⬠(Mark, 2014) The wireless pineapple works in a unique way. Normally, any wireless devise would try to connect to the previous or last websites that were used. The Karma method often sends out probe request to want information from a specified point by SSID or access points that are specified by the broadcast SSID.The correct access point-AP,will always probe a response in which the client will initiate an association thus connection to home networks. However, a malicious device can break the code based system making the pineapple to responds to whatever AP the device has asked therefore deceiving it into believing they are home. This will make the attackers to access the information that they are not supposed to view. The WIFI pineapple is subjected to numerous risks. Ordinarily, the honey pots are usually set to get the traffic of the browser. When an individual sends data using the attackers system he or she opens herself to sslstrip risks. This sslstrip often rechannel the HTTPS traffic to HTTP equivalent thereby opening way to attackers. However, these risks can be mitigated using the following ways: (Anonymous, 2012) V. PineAP.This is "the next-gen rogue AP". This reduces Karma attack by sending Broadcast probe request only instead of all the SSIDs.This enables the APs to with a beacon with the information they are broadcasting. This enables the customer to decide on the one to connect to making it secure. The PineAP has several modules that make it to
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.