How to Defend Against WiFi Attacks and WiFi Pineapples

Поділитися
Вставка
  • Опубліковано 8 чер 2024
  • On this episode of HakByte, @AlexLynd demonstrates how you can detect and stop WiFi Pineapples that are running KARMA attacks and hosting malicious WiFi networks. This demonstration uses a simple Python tool that profiles rogue access points, and uses deauthentication to prevent victims from connecting to an evil AP.
    -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆
    Buy a WiFi Pineapple: shop.hak5.org
    WiFi Pineapple Detector: github.com/AlexLynd/WiFi-Pine...
    Running KARMA attacks on a Pineapple: • Create Rogue Networks ...
    Alex Lynd's Twitter: / alexlynd
    Alex Lynd's GitHub: github.com/AlexLynd
    Alex Lynd's website: alexlynd.com
    -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆
    Chapters:
    Intro @AlexLynd 00:00
    What are KARMA Attacks? 00:20
    How Can We Detect & Prevent KARMA? 00:56
    Tool's You'll Need 01:24
    How to Detect WiFi Pineapples 01:32
    Installing Dependencies 03:43
    Enabling Monitor Mode 04:51
    Starting the Detector 06:35
    Spotting Rogue Access Points 08:13
    Defending Against Attacks w/ Deauthing 08:43
    Implications & Limitations 09:40
    Outro 10:25
    -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆
    Our Site → www.hak5.org
    Shop → hakshop.myshopify.com/
    Subscribe → ua-cam.com/users/Hak5Darr...
    Support → / threatwire
    Contact Us → / hak5
    -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆
    ____________________________________________
    Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community - where all hackers belong.
  • Наука та технологія

КОМЕНТАРІ • 45

  • @Jake-fe4uf
    @Jake-fe4uf 2 роки тому +14

    yes more defense security stuff. I am trying to gain knowledge to get into this space. Many more job openings for blue team than pen testing. Thanks!

  • @JohnRobertPotter
    @JohnRobertPotter 2 роки тому +1

    Thank you for the content. Your tempo and vocal intonation is really awesome. Excellent job on the tool

  • @SvenneKrap
    @SvenneKrap 2 роки тому +9

    What happens if it sees a real AP sending multiple SSIDs (corporate and guest network for example)?

  • @buckduff6003
    @buckduff6003 2 роки тому +1

    I have no more doubts. Շնորհակալություն եմ հայտնում եղբորս, աչքերս բաց են

  • @poorlittledutchkid
    @poorlittledutchkid 2 роки тому

    good work - easy to follow and understand sraight to the point

  • @miguelofre
    @miguelofre 2 роки тому

    This guy has to give us courses please!!!!!!! You are amazing!!!!!

  • @howtodefeatgangstalking
    @howtodefeatgangstalking Рік тому +1

    But the pineapple has an update that randomizes the Mac Address now. So technically this won't work anymore.

  • @endlessoul
    @endlessoul 2 роки тому +2

    Is it possible to keep a tool running that is set to constantly detect attacks that things like the Pineapple would be running?

  • @dietrichdietrich7763
    @dietrichdietrich7763 Рік тому +1

    how do i defend against someone possibly using a pineapple or malicious item like this backdooring my home's router network on a normal windows home laptop? I just want to fix my connections back to normal.

  • @mikepaschal2260
    @mikepaschal2260 10 місяців тому

    This was awesome content, thanks

  • @jmr
    @jmr 2 роки тому +3

    Great video. Emulating a probe request for a fake access point name to see if something emulated it .... Wonder if there is a name for that?

    • @howtodefeatgangstalking
      @howtodefeatgangstalking Рік тому +1

      Lol how are you verified with not even 300 subscribers.. 👀 maybe has something to with the obvious fact that your a hacker lol and very intelligent and most likely capable.. Lol.. That's crazy 😂🙏👌

  • @xxxDEV1xxx
    @xxxDEV1xxx 2 роки тому

    What do you make of very nearby SSIDs with the first six digits of your own routers MAC? or plugging in a brand new router and it broadcasts SSID on sticker but with an unknown MAC, then 3 minuets later starts broadcasting the correct MAC and the fake one disappears?

  • @EmilianoMartinez82
    @EmilianoMartinez82 Рік тому

    What dongle where you using, i like the small form factor.

  • @bluegizmo1983
    @bluegizmo1983 2 роки тому +1

    And what happens when the attacker simply spoofs the "hardware ID" for each broadcasted AP? Then your detection fails right out of the gate.

    • @hak5
      @hak5  2 роки тому +8

      Hey Daniel! I cover this scenario at the end of my video; It's still possible to detect KARMA attacks / rogue AP's if you beacon out pseudorandom SSID's and see if the Pineapple creates networks in response. Let me know if you want me to demonstrate this!
      - Alex

    • @timballam3675
      @timballam3675 2 роки тому

      @@hak5 wonder if this could be made to run on a small MCU?

    • @lazyenword
      @lazyenword 2 роки тому

      @@timballam3675 I don't think it is capable of monitor mode so probably not

  • @stacksmasher
    @stacksmasher Рік тому

    OK what adaptor are you using?

  • @user-qr4yv2nd6k
    @user-qr4yv2nd6k 2 роки тому +1

    banger content as always. or should i say, smanger. gods work boiz.

  • @rhadiem
    @rhadiem 2 роки тому

    Did this couple take over Hak5?

  • @howtodefeatgangstalking
    @howtodefeatgangstalking Рік тому

    That being said.. Please make a video showing how to detect deauth packets being sent to your router or wifi signal.

  • @dryelwicho9383
    @dryelwicho9383 2 роки тому

    How can I buy on your website?

  • @anonymousbritishcolumbia
    @anonymousbritishcolumbia Рік тому

    There's no way to install this tools I've tries everything termcolor doesn't work or even exist anymore. I've literally tried everything

  • @sgtfoose8842
    @sgtfoose8842 2 роки тому

    Please show us how to man in the middle and present our custom page when a client request a specific page (like Beef does) on the MK7

    • @ministrodajuventude
      @ministrodajuventude 2 роки тому +1

      DNS spoofing on the Pineapple? That would be dope!

    • @sgtfoose8842
      @sgtfoose8842 2 роки тому +1

      @@ministrodajuventude yes should be doable since we have the Evil Portal. Instead of showing the portal always, it should only present the page when a page request matches our definition. I guess having a client browse on the MK7 might still be an issue since I read it provides low bandwidth, but the new 2.0 might just improve that bit

    • @bradley6727
      @bradley6727 2 роки тому +1

      This has been achieved.

  • @tvathome562
    @tvathome562 2 роки тому +3

    More defensive videos interesting, can learn how to recognise and mitigate as well as protect own network.

  • @renditionsofthefuture8815
    @renditionsofthefuture8815 2 роки тому +1

    Using public WiFi = Toast

  • @AdamHillikerLikesRobots
    @AdamHillikerLikesRobots Рік тому

    I would love more defensive stuff please!

  • @plushplush7635
    @plushplush7635 2 роки тому

    blacklist = pp_analysis(info_list, pp, pisavar_method) that's interesting, im trying to figure out how you determine it, ok deauth mac address, smart

  • @serkanonf
    @serkanonf 2 роки тому

    Please more defensive videos. Also how to clean systemd virus malware trojan. My neighbour also injected malicious script that elevates root permissions and sending my network ip via avahi deamon. Journal full of comm="systemd" exe="/usr/lib/systemd/systemd" hostname =? addr=? terminal=? res...

  • @imfunatparties9463
    @imfunatparties9463 2 роки тому +2

    Great video. Also you're so cute!

  • @Christian-cz9bu
    @Christian-cz9bu 2 роки тому +1

    Yes please on more defensive content.

  • @shadowbrother24
    @shadowbrother24 2 роки тому +1

    Sadly deauthenication doesn't work on my devices somehow.
    My phone warns me that the network is suspicious if it's trying to connect to a pineapple AP. Also IoT devices won't got tricked.
    All in all never made a successful attack in my own environment, which is kinda disappointing especially for a $100 device

    • @jakobro1794
      @jakobro1794 2 роки тому

      Interesting, what iot devices did you use, what models? What phone did you use?

    • @shadowbrother24
      @shadowbrother24 2 роки тому

      @@jakobro1794 Samsung Note 10 Lite with Android 12. Different phones like iPhones are not working either.
      IoT Devices: Shelly Light Bulbs, Smart Plugs, etc... ESP8266 based Devices.

  • @florida173
    @florida173 2 роки тому

    Python2?

  • @creepymcpeepers
    @creepymcpeepers 2 роки тому

    Do your like siracha

  • @creepymcpeepers
    @creepymcpeepers 2 роки тому

    Hello

  • @Glass_Of_Tea
    @Glass_Of_Tea 9 місяців тому

    Just Turn Your WIFI Off it is an amazing hack.