How to Create Mark V Pineapple Infusions/Plugins

Introduction The Pineapple (since Mark IV) has introduced the idea of infusions; community written plugins that when approved become available on the Pineapple-Bar for all to use.  Since the introduction of Interface 3.0/Mk4 or 1.0/Mk5 these infusions have changed to a more uniformed modular approach.  This has the following benefits: easier to create modular design similar code-base (easier to review) generally more secure code Now creating new plugins may seem…

WiFi Pineapple; Decrypting SSL Traffic on Mobile Applications

Introduction Most people view the WiFi Pineapple as in intrusive piece of kit. Marketed as a WiFi device that can trick unsuspecting clients to connect to the AccessPoint (AP) because the device is sending out Probe responses that match devices Probe requests.  From there a victim is then susceptible to Man-in-The-Middle (MiTM) attacks, interception and traffic manipulation.  The device has been famously used on Channel 4’s Derren Browns Apocalypse (http://en.wikipedia.org/wiki/Derren_Brown:_Apocalypse),…

Naked WiFi Pineapple Mark V!

Introduction We will take a look at the new Mark V insides, the board, the kernel and its interfaces: Specification CPU: 400 MHz MIPS Atheros AR9331 version 1 SoC http://www.eeboard.com/wp-content/uploads/downloads/2013/08/AR9331.pdf Memory: 16 MB ROM (w25q128 (16384 Kbytes)), 64 MB DDR2 RAM (Hynix H5PS5162GFR-Y5C) Disk: Micro SD support up to 32 GB, FAT or EXT, 2 GB Included Mode Select: 5 DIP Switches – 2 System, 3 User configurable Wireless: Atheros AR9331 IEEE 802.11 b/g/n +…

New WiFi Pineapple; From Britain with Love!

Introduction Since approximately around the time of our posting Blue for the Pineapple (6 months ago). Hak5 Pineapple Team have disappeared underground to produce the new Mark 5 Pineapple. A customised board that is cheaper to produce and more easily affordable. The Mark 5 has 2x WiFi cards (Atheros 9331 & RTL8187 (famously known as an Alfa)), with SMA connectors. Twice the RAM & ROM (16MB & 64MB), with the…

… Green For The Anti-Pineapple

Background Following on from the previous Post (Blue for the Pineapple…). I now want to introduce the Anti-Pineapple! Your probably asking the question “How do you create an Anti-Pineapple?” The answer is quite simple; by conducting a review of the security measures installed on the Pineapple device itself; it should be quite easy to create a list of possible scenarios and counter-measures.

…Yellow for a slice of Pineapple Pi…

First we brought you “Blue for the Pineapple…” a cheap Access Point and hack to make the Pineapple Project more affordable for students/researchers or even pentesters as a cheap expendable throwaway pwn-box. The plan to port the Pineapple was always on the cards, especially after the successful port to the TPLink AP.  After several inquisitive comments and emails we bring you an update… …a slice of Pineapple Pi .

Pineapple Defences

Background With the previous post (Blue for the Pineapple); sharing instructions on how to create a cheaper and more affordable clone of the infamous Hak5 Pineapple.  Awareness has risen about the capabilities and exploitability of these WiFi honeypots.  This post will discuss possible defences against the pineapple: Setting Access Points to Use WPA2 or Enterprise Encryption SSL VPN Manual Connections

WiFi Pineapple | Blue For The Pineapple | InteliSecure

Background The WiFi Pineapple, was a device coined by the Hak5 (www.hak5.org) Team back in 2008. Originally it was a hacked Fon/Fonera AccessPoint (AP) with Karma patches applied to hostapd. Back then Digninja (Robin wood) called it Jasager (http://www.digininja.org/jasager/), it was called this because the AP software answered “Yes” to all WiFi Beacon Frames; if a WiFi client was looking for the SSID BTOpenzone the Pineapple(or Jasager) would reply “That’s…