• @[email protected]
    link
    fedilink
    English
    201 year ago

    A lot of the comments here are saying that a pineapple can configure their subnet to use 10.x.x.x or 192.168.x.x. Is there any other way to determine if an access point is compromised?

  • @[email protected]
    link
    fedilink
    English
    521 year ago

    The only part of this I didn’t immediately realize is the wifi pineapples default IP range.

    From now on, I’m going to set that as my clients default public IP range to troll anyone who knows.

  • @[email protected]
    link
    fedilink
    301 year ago

    Does this matter if the traffic is encrypted, such as an https website instead of http? Like, really how often is internet traffic unencrypted?

    • @[email protected]
      link
      fedilink
      201 year ago

      Yes, back when I was playing around with my WiFi pineapple there were a wide variety of tricks to break SSL authentication without it being obvious to users. Easiest was to terminate the SSL connection on the pineapple and re-encrypt it with a new SSL cert from there to the users browser, so to the user it looked like everything was secure but in reality their traffic was only encrypted from them to the pineapple, then decrypted, sniffed and re-encrypted to pass along to the target websites with normal SSL.

      Man in the middle attacks really do give the attacker tons of options

      • @[email protected]
        link
        fedilink
        171 year ago

        That kind of ssl interception would normally be quite visible without your client device having the pineapples cert in your devices trust store, or am I wrong?

        • @[email protected]
          link
          fedilink
          8
          edit-2
          1 year ago

          I’m sure a lot has changed in 10 years ago so this won’t be relevant today, but back when I was last playing with this, sslstrip was the tool I was using on the pineapple to enable SSL mitm attacks - https://github.com/moxie0/sslstrip

          I’d imagine there are new techniques to counteract new defenses - this stuff is always cat & mouse

    • @[email protected]
      link
      fedilink
      English
      191 year ago

      Not often. For web browsing - and the majority of apps - your session is encrypted and certified. Breaking SSL is possible but you’ll know about it due to the lack of certs.

  • ᕙ(⇀‸↼‶)ᕗ
    link
    fedilink
    81 year ago

    neither is that range pineapple exclusive nor should ppl use public wifi without a proper vpn.

    so the meme makes no sense. if you recognize the pineapple default range but yet dont use a vpn…then you re a dumbass.

  • @[email protected]
    link
    fedilink
    English
    461 year ago

    *connects to pineapple

    *sets subnet to 10.0.0.0/16 so I don’t have to type a yee yee ass class B/C address everytime I wanna do something with an address

    Or

    *connects to pineapple

    *Sets subnet to same as target network so paranoid user doesn’t realize he connected to evil twin

    • @[email protected]
      link
      fedilink
      English
      21 year ago

      sets subnet to 10.0.0.0/16 so I don’t have to type a yee yee ass class B/C address everytime I wanna do something with an address

      Personally I find 172.16.0.0/12 addresses are easier for me to quickly type accurately than any other private range. 192.168.0.0/16 is just too many similar-but-different digits, and 10.0.0.0/8 is too many similar/the same digits before I get to the digits I actually care about, so both are more error prone for me

    • Natanael
      link
      fedilink
      41 year ago

      Always do transparent tunneling with selective MITM, lol

      (not gonna help script kiddies any more than this either, lol)