Hak5 WiFi Pineapple Mark VII – Captive Portal with Wireless Phishing & Nmap Scan

Picture of Written by Rob Parker

Written by Rob Parker

Rob is a Certified Ethical Hacker (CEH v11) from EC-Council and a certified EIPA Data Protection Officer that specialises in security and ethical hacking. He has worked in all parts of the world in various security roles and is keen on helping others in their ethical hacking journeys.

Steam Labs Ethical Hacking posts are designed to educate, introduce and demonstrate hacking tools for penetration testing purposes only. We will not be held responsible for people who use these skills for illegal or malicious attacks.

In this tutorial I am going to walk you through how to get started with Evil Portal on the WiFi Pineapple from Hak5 and how a penetration tester would use a tool like this to capture someones credential when logging into an open wifi point.

Links from video

Github Kleo Phishing Templates | https://github.com/kleo/evilportals

WiFi Pineapple Tactical Edition | https://shop.hak5.org/products/wifi-pineapple?variant=32019576094833

Today I’ll show you how to use a Wifi Pineapple to create a fake open access point to conduct a phishing attack and steal victim user credentials, all in the name of becoming aware of what’s possible to better protect yourselves.

Check out our video above to see step by step instructions and use the timeline under the video to skip to certain points.

Useful links from video

WiFi Pineapple Tactical Edition | https://shop.hak5.org/products/wifi-pineapple?variant=32019576094833

You May Also Like