How a Wi-Fi Pineapple Can Steal Your Data (And How To Protect Yourself From It) (vice.com) 46
An anonymous reader writes: The Wi-Fi Pineapple is a cheap modified wireless router enables anyone to execute sophisticated exploits on Wi-Fi networks with little to no networking expertise. A report in Motherboard explains how it can be used to run a Wall of Sheep and execute a man-in-the-middle attack, as well as how you can protect yourself from Pineapple exploits when you're connected to public Wi-Fi. "... it's important that whenever you are done connecting to a public Wi-Fi network that you configure your phone or computer to 'forget' that network. This way your device won't be constantly broadcasting the SSIDs of networks it has connected to in the past, which can be spoofed by an attacker with a Pineapple," reports Motherboard. "Unfortunately there is no easy way to do this on an Android or an iPhone, and each network must be forgotten manually in the 'Manage Network' tab of the phone's settings. Another simple solution is to turn off your Wi-Fi functionality when you're not using it -- though that isn't as easy to do on some devices anymore -- and don't allow your device to connect to automatically connect to open Wi-Fi networks."
nothing new here. (Score:2)
MITM wifi attacks and hotpot impersonation have been a thing for the better part of a decade now, what does this bring to the table that malicious actors didn't already have?
Re: (Score:2)
This brings nothing new. The same old solution from over a decade ago works just as well - connect to a VPN.
Android supports this, I'd be surprised if iOS didn't as well.
Re:nothing new here. (Score:4, Interesting)
Even on iOS, VPNs are trivial. Some VPNs even offer an app which can allow you to select the closest server group, install a profile, and have the VPN auto configure when on Wi-Fi, with the ability to whitelist a few trusted SSIDs.
I'm amazed that Apple or Google hasn't offered their own VPN service where you just flip a switch, ensuring no matter what hanky-panky the AP/ISP does, the worst they can do is slow down or block traffic, not change it.
I decided to go with a VPN always when telcos started actively adding X-UIDH headers on HTTP exchanges. That, and Phorm with ads injected via traffic in flight.
Re: nothing new here. (Score:2)
Re:nothing new here. (Score:4, Insightful)
MITM wifi attacks and hotpot impersonation have been a thing for the better part of a decade now, what does this bring to the table that malicious actors didn't already have?
Yes, but now it has a Web 2.fucking.0 name, a marketing slogan and can be encased in a plastic pineapple. Cant you see how this is completely different?
Re: (Score:2)
Yes, but now it has a Web 2.fucking.0 name, a marketing slogan and can be encased in a plastic pineapple. Cant you see how this is completely different?
Actually it had all that nearly a decade ago, too [youtube.com].
Re: (Score:2)
Hotpot impersonation, the bane of holiday cookouts across the nation.
Re: (Score:1)
I'm not buying it (Score:2)
Re: (Score:2)
Re: (Score:2)
Especially since you can construct something much smaller, with COTS parts, for less than half that.
(psst... hacked zsun + USB battery pack. Other than N, and maybe really loud antennas, it can do anything this thing does. Total price: retail ~35$)
Re: (Score:2)
Obligitory (Score:2)
Pen Pineapple Apple Penetration.
Already fixed (Score:5, Interesting)
Take a look, I'm not connected with the project.
From F-Droid (Score:1)
F-Droid [f-droid.org].
A problem is that the function of disabling wifi to out-of-place SSIDs requires to enable location services.
Re: (Score:1)
No, that is too difficult. It means people will miss five seconds of texts which are coming through.
Re: (Score:2)
No, that is too difficult. It means people will miss five seconds of texts which are coming through.
Texts come through perfectly fine without Wi-Fi. Messaging doesn't use Wi-Fi.
SSID Broadcast (Score:2, Informative)
Only the SSIDs of hidden networks need to be broadcast, not all SSIDs of the listed networks.
Re: SSID Broadcast (Score:1)
THIS.
On Windows you even get a warning when connecting to hidden SSID networks, for exactly this reason.
Re: SSID Broadcast (Score:1)
Or the god damn WiFi spec could have the router send its public key on connect and if it doesn't match the phone's stored public key, fail. Otherwise, communicate using the public key. If the router sends a public key it doesn't have the matching private key for, it can't decrypt anything anyway.
Try making it clear (Score:5, Insightful)
Re: (Score:3)
Re: (Score:3)
Why do they need to shout "Hey, here are all the access points that I have connected to in the past"?
It's part of the spec, not so much wifi specifically but DHCP and DNA protocols.
The idea was when you first connect to a wifi network, you use ARP at layer 2 and broadcast a DHCP request to get a valid IP to begin using layer 3.
When you are disconnected "briefly" and reconnect later, that IP is likely to still be valid for use.
Using DNA (direct network attachment), you can broadcast the previously used router MAC, device MAC, and SSID to verify you are on the same local link, and can begin reusing your prev
Great! (Score:4, Funny)
All WiFi devices are vulnerable. OK I am going to turn off wi-fi and use only mobile data
Next?
Rouge Cell towers, stingrays, ...
ALL OUR BASES ARE BELONG TO THEM
Re: (Score:1)
and laws aren't going to help you because stingrays should already be illegal...
Re: (Score:3)
Well, just connect to the blue or green ones. Problem solved.
Damn fruits (Score:2)
Apple WiFi dangerous, Pineapple WiFi dangerous ...
I guess I'll stick to WiFi Vegetables.
Another reason to miss my Windows Phone (Score:2)
I could set it up to only connect to wifi at certain locations, it was such a battery saver. I mean like now I can set my iPhone to connect to only known networks (even though that is how this attack works) etc etc, but having the geofencing was sweet.
Breakthrough security method (Score:3)
Re: Breakthrough security method (Score:1)
This is a very geographically limited solution. Cheap, quality mobile data is far from ubiquitous even in the us, let alone globally.
Re: (Score:3)
Cheap, quality mobile data is far more accessible outside the US than in. You seem to be living in a bubble.