Hacking Mobile Devices Using WiFi Pineapple Nano
Abstract
Nowadays wireless access points can be found everywhere from fast food restaurants to private companies embracing Bring Your Own Device (BYOD) policies. These access points present a flexible solution in which different mobile devices can be connected to a wireless network and still perform effectively. Often the main concern with the use of access points is the lack of security they have. Most of the time users connect to wireless access points not knowing if they are genuine or malicious, or knowing of the vulnerabilities and risks that these represent to their devices and to their networks. Even more, they are not aware of the types of attacks that can come from “rogue” access points set up by Hackers, and the type of information they can capture. These Hackers use the lack of user awareness to their advantage to gain access to sensitive or confidential information. The objective of this assessment is to examine the effectiveness of the WiFi Pineapple Nano and how is used as a rogue access point to deceive users to connect to it. Part of the scenarios used in this research provided the opportunity to educate and promote user awareness. Key Terms ⎯ Man-in-the-middle (MITM),
Rogue Access Points, Secure Socket Layer (SSL),
Service Set Identifiers (SSID).