Hacking Mobile Devices Using WiFi Pineapple Nano

Date

Publisher

Polytechnic University of Puerto Rico

Item Type

Article
  • Total Views Total Views21
  • Total Downloads Total Downloads59

Abstract

Nowadays wireless access points can be found everywhere from fast food restaurants to private companies embracing Bring Your Own Device (BYOD) policies. These access points present a flexible solution in which different mobile devices can be connected to a wireless network and still perform effectively. Often the main concern with the use of access points is the lack of security they have. Most of the time users connect to wireless access points not knowing if they are genuine or malicious, or knowing of the vulnerabilities and risks that these represent to their devices and to their networks. Even more, they are not aware of the types of attacks that can come from “rogue” access points set up by Hackers, and the type of information they can capture. These Hackers use the lack of user awareness to their advantage to gain access to sensitive or confidential information. The objective of this assessment is to examine the effectiveness of the WiFi Pineapple Nano and how is used as a rogue access point to deceive users to connect to it. Part of the scenarios used in this research provided the opportunity to educate and promote user awareness. Key Terms ⎯ Man-in-the-middle (MITM), Rogue Access Points, Secure Socket Layer (SSL), Service Set Identifiers (SSID).

Description

Keywords

Man-in-the-middle (MITM), Rogue Access Points, Secure Socket Layer (SSL), Service Set Identifiers (SSID)

Citation

Mojica Serrano, A. (2019). Hacking mobile devices using WiFi Pineapple Nano [Unpublished manuscript]. Graduate School, Polytechnic University of Puerto Rico.

Collections