Attacks & Threats
Wi-Fi Pineapple
Also known as: Pineapple
Definition
A commercial wireless auditing platform from Hak5 that automates rogue access point, evil-twin, and man-in-the-middle attacks, widely used in red-team engagements.
Examples
- A red-team operator using a Pineapple Mark VII near a conference venue to capture credentials from auto-joining laptops.
- Setting up a Pineapple as a portable evil twin to test wireless policy compliance in a corporate office.
Related terms
Evil Twin Attack
A Wi-Fi attack in which an adversary stands up a rogue access point that mimics a legitimate SSID, so victims connect to it and expose traffic or credentials.
Rogue Access Point
An unauthorised wireless access point connected to a network, either installed maliciously by an attacker or naively by an employee, that bypasses network security controls.
Man-in-the-Middle Attack
An attack in which an adversary secretly relays or alters communications between two parties who believe they are talking directly to each other.
SSL Stripping
A man-in-the-middle attack that silently downgrades a victim's HTTPS connection to plain HTTP so the attacker can read and modify the traffic.
Penetration Testing
An authorized, simulated cyberattack against systems, applications, or people to identify exploitable weaknesses before real adversaries do.
WPA3
WPA3 — definition coming soon.