PiSavar: WiFi Pineapple Activities Detection

PiSavar

PiSavar – Detects PineAP module and starts deauthentication attack (for fake access points – WiFi Pineapple Activities Detection)

About Project

The goal of this project is to find out the fake access points opened by the WiFi pineapple device using the PineAP module and to prevent clients from being affected by initiating a deauthentication attack to the attacking device.

How PineAP Module Works

  • Collects SSID information
  • Creates SSID pool with collected SSID information
  • Creates fake access points using information in the SSID pool

 

Features of PiSavar

  • Detects PineAP activities.
  • Detects networks opened by PineAP.
  • Starts deauthentication attack for PineAP.

Diagram

Usage

Requirements

  • Hardware: TP-LINK TL-WN722N
  • Modules: scapy, time, termcolor, argparse, commands, netifaces, logging

Kali Linux:

git clone https://github.com/WiPi-Hunter/PiSavar.git

pip install termcolor

Run the program with the following command:

Monitor mode:

airmon-ng start interface(wlan0,wlan1) (Monitor mode)


or

ifconfig wlan0 down
iwconfig wlan0 mode Monitor
ifconfig wlan0 up

Run:

   

Demo

Copyright (C) 2017 besimaltnok

Source: https://github.com/WiPi-Hunter/