Full Transcript

·YouTLDR

WiFi Pineapple Attack Demo [ThreatLocker Webinar]

31:306,392 words · ~32 min readEnglishTranscribed Apr 22, 2026
0:01

[Music]

0:15

Thank you for joining us everybody. Good

0:16

morning. We're this is going to be a

0:18

pretty quick webinar. We want to try and

0:19

get it done in 15 20 minutes. Um we're

0:22

joined by Rob Allen who's the VP of

0:23

operations for Threat Locker in Europe.

0:25

So Rob, thank you for joining us.

0:27

No problem at all. We're also joined by

0:29

uh Jason Ebanks, which is sitting at the

0:31

other side of my office. You have to

0:32

come around because I can't turn the

0:33

camera around and give everyone a wave.

0:35

Jason is our resident pilot for the day.

0:38

So, he's going to

0:40

say he's going to be responsible for any

0:43

accidents that happen, not me. Um, so we

0:46

want to show you and introduce you to a

0:48

pineapple. For those who don't know, we

0:49

have a conference in February, February

0:51

1 through 3, which is a essentially a

0:55

cyber security conferences that teaches

0:57

you how to protect yourself from cyber

0:59

security threats. It also teaches you

1:01

how to break into systems, hack, use

1:04

rubber duckies, use pineapples, use

1:05

metas-ploit and write malware. Not

1:08

because we want you to do that, because

1:09

we want you to understand what the

1:11

threats are. And every time we learn

1:12

something we about hacking, we learn

1:14

something about defending. at the same

1:16

time. Uh, one of the things we're going

1:17

to be demonstrating and doing a lot of

1:19

courses on there is the pineapple. So,

1:21

this is a Wi-Fi pineapple box. It comes

1:23

like this. It is about $150. I can't

1:26

remember the exact price, but Gabby

1:27

might correct me if I'm wrong. Um, it

1:30

comes in a box and it's a pretty small

1:32

box. I'm going to open this one up and

1:35

um, we've got a few of them here. So,

1:37

we've attached one to the drone for the

1:38

for the real

1:41

life hack. And if I can open up the

1:43

plastic here.

1:45

Looks a little bit like this. Pretty

1:46

boring. And look, Rob's got one already

1:48

pre-made because he's trying to shower.

1:50

Ariel's coming. Three antennas. And

1:52

essentially what this device does is it

1:55

broadcasts a Wi-Fi signal. Now, it's a

1:57

little bit smarter than that. It can

1:59

actually read uh it can track um Wi-Fi

2:03

hotspots that people are trying to

2:04

connect to. So every time you connect to

2:06

something on your phone, your phone

2:07

keeps retrying to connect to that

2:09

hotspot just in case you go back in that

2:10

area. I didn't know that until actually

2:12

this morning.

2:14

And what we managed to pick up was a

2:15

list of hotspots of everybody in our

2:17

office had previously connected to. So

2:19

it'll actually broadcast scan for what

2:21

people are trying to connect to and then

2:22

it'll actually broadcast those hotspots

2:24

as well. Um if you want to do these

2:26

demonstrations, you need to make sure

2:27

you have an Ethernet cable connected as

2:29

we do. Uh because things can go horribly

2:31

wrong if you try and use Zoom over Wi-Fi

2:32

while doing this. So you build this

2:34

together. It's a pretty simple box and

2:37

basically you plug it in in a location.

2:39

It will broadcast uh Wi-Fi SS IDs and it

2:43

will allow you to get people to connect

2:45

to your Wi-Fi instead of theirs. And

2:47

once they connect to your Wi-Fi, you

2:48

Wi-Fi, you can do various things. So,

2:50

examples of use might be you got fed up

2:53

with an airline charging you for credit

2:54

card usage. So, you plug in your

2:56

pineapple on the plane and you take down

2:58

their Wi-Fi and you broadcast SSID. Do

3:01

not do that. That is highly illegal.

3:02

Plus, don't mess around with wireless

3:04

technologies on planes because we're not

3:05

really sure how much will take down the

3:07

plane. But you could, if you're an

3:09

attacker in an airport want to steal

3:11

people's credit cards from paying for

3:12

Wi-Fi, you could host a fake credit card

3:14

page, you could you could um put

3:18

a fake uh Wi-Fi welcome page and say,

3:21

"Here, you got to pay for premium Wi-Fi,

3:23

enter your credit card name, or you can

3:24

even present Office 365 or G Suite

3:27

login." Rob's going to show you some of

3:28

it. Now, the problem is with this is you

3:30

really want to be as close to the person

3:32

as possible you want to get on your

3:34

Wi-Fi because their computer is going to

3:36

try and connect to their Wi-Fi and it's

3:38

going to try and connect to your Wi-Fi.

3:39

Now, you can do a deorth attack to keep

3:41

kicking them off their Wi-Fi, but it's

3:43

going to try and connect to the SSID and

3:44

it's probably going to connect to the

3:45

closest one. The best way to get closest

3:48

to a person is probably walk up to them.

3:50

But, we want to do something a little

3:52

bit cooler today. So, we have this thing

3:53

here. This is going to make your

3:56

experiment a little bit more expensive

3:57

if you want to do it. So, this is a

3:59

Maverick 3 drone. Cost about $2,600 at

4:02

Best Buy. Three things.

4:04

Can I just That That is what I would

4:06

call an accident waiting to happen.

4:07

Danny,

4:08

accident already happened.

4:10

So, so I'll turn on the There's been a

4:14

few incidents. Um the painters are

4:16

coming back into Threat Locker's new HQ

4:18

next week to fix the wall. Um so,

4:20

outside my office. Uh but few things you

4:23

need on this drone. Um, you needed to be

4:25

able to lift enough weight to carry a

4:27

pineapple, which is not too heavy. But,

4:30

um, the rating, this was the only

4:32

Maverick drone that actually had, well,

4:34

the lowest level Maverick drone that

4:37

would actually lift the pineapple by

4:40

their specification. Rob corrected me in

4:42

that he did actually lift one with a

4:44

lighter one last year. So, if you've got

4:45

a light

4:45

and a battery and a battery as well.

4:47

And a battery as well. But this was the

4:49

one we wanted to do this properly. We

4:51

were flying it four stories high in a

4:53

public area. So, we didn't want it to

4:54

come crashing down. Uh, so we got the

4:56

right one. It needs to have a USBC

4:58

charging port on it that will not just

5:00

charge the drone, but will actually

5:02

charge the pineapple because the

5:03

pineapple does not have a battery in it.

5:05

So, you either need to be able to lift a

5:07

backup battery or you need to lift you

5:09

need to charge it. So, this one here is

5:10

handy because it's got USBC in which

5:12

means you can plug the pineapple

5:13

directly into it and it will power it.

5:15

So, I'm going to plug that back in

5:17

because we're going to need to power it.

5:19

And, uh, pretty much else outside of

5:21

that, it needs a pilot. Um, because I

5:24

crashed it yesterday, I was told I'm not

5:25

allowed to fly in.

5:27

I'm barred from my toy. This one has a

5:29

cool camera as well. And thankfully, we

5:32

might actually be able to see in the

5:33

window or at least get some pictures

5:34

from in the window because when we tried

5:35

it yesterday, the the glass on the

5:38

outside of our building reflected the

5:39

image, so all they could see was the

5:41

drone flying in on the camera. Today, we

5:44

are under tornado watch in Orlando,

5:46

which means the drone might not actually

5:48

make it. So, I'm going to ask Abby to

5:50

pull a pull up today because the goal is

5:52

here. We're going to take this drone.

5:54

We're going to attach this panel to it.

5:55

Well, Jason's going down and doing that.

5:57

We're going to get you some footage of

5:58

him trying to take off. If he crashes,

6:00

it's going to be really funny. Um, I'm

6:03

going to ask for a poll as what's the

6:04

likelihood of this working.

6:07

So, we have not rehearsed this hack at

6:09

all. We did fly the drone yesterday, but

6:10

we haven't rehearsed the hack. We are on

6:12

tornado watch. It is looking pretty gray

6:14

outside today. It's not raining yet, but

6:17

Gabby, if you can start a poll as to

6:19

whether we're going to successfully take

6:22

over my Wi-Fi or Rob's Wi-Fi using the

6:24

drone or we're going to um or we're not

6:28

going to. If you can throw that poll up,

6:29

we'll see who's right. We may use the

6:31

the correct or incorrect answer based on

6:34

whether you win the giveaways at the

6:37

end. So, make sure you answer the best

6:38

you think is going to happen, not Mr.

6:40

Positivity or Mr. Negativity or Mrs.

6:42

Positivity or Mrs. Negativity. answer

6:44

the best one you're having. So Jason,

6:46

first of all, I'm gonna hand this over

6:47

to you.

6:49

And I'm gonna let you Oh, I pressed

6:52

something on my keyboard. I'm gonna let

6:53

you go and to bring this up to my

6:55

window. If he brings it up there, if he

6:56

gets up here, I will turn my camera

6:58

around so you can see the window as

6:59

well.

7:02

So

7:03

before people vote, I'd just like to add

7:05

an addendum to our um anyone who saw the

7:08

um hacking webinar we did last week, we

7:10

did mention that never work with

7:12

children, animals, or hacking tools. Um

7:15

I'd just like to add an addendum to that

7:16

now, which is never work with children,

7:18

animals, hacking tools, but especially

7:20

why not Wi-Fi pineapples because they're

7:21

really flaky. Um but we will we will do

7:25

our best. We will do our best.

7:27

So 81% of people think this is going to

7:29

work. Now,

7:30

I love your optimism, people.

7:32

Yeah. So, if you remember last week, Rob

7:34

had had lots of time to practice. I

7:36

don't get so much time as Rob because my

7:38

life's a little bit busier and I didn't

7:40

get to practice my my hacking uh tests

7:43

and we Rob did his first. He was playing

7:46

with Rubber Ducky. And if you recall, we

7:48

took over Team Viewer and we completely

7:50

tanked his laptop. So, uh what we're

7:53

going to give this one to Rob because

7:55

see if he can actually get this one to

7:56

work. But just for those who weren't

7:58

here last week, Rob started uses rubber

8:01

ducky, showed us how to steal data using

8:02

rubber ducky, showed us how to use Red

8:04

Rabbit, and then what we did is I got

8:06

him to connect to my machine using Team

8:08

View. I didn't connect to his and I

8:10

tanked his laptop. Uh the boot sector

8:12

has still not been repaired, by the way.

8:13

So, uh I completely killed his laptop

8:16

just by him connecting to my machine.

8:18

So, if you did miss that, um I don't

8:20

know, Gabby, maybe you can share where

8:22

you can get that webinar from. And what

8:24

I'm going to do as well, we have to mute

8:26

for a minute while he takes off because

8:27

apparently the video only shows although

8:30

it seems to be showing all four people

8:32

evenly. Oh, he's already taken off.

8:36

He's on mute anyway. So, here is Jason

8:39

uh taking the drone up outside my office

8:41

now. I don't see it. Oh, here it is.

8:44

There you go.

8:46

Can we see that? Oh, you're right in the

8:48

middle of the the bar. So, we need to

8:50

There you go. Move a little bit left or

8:51

right. There you So, we can see the

8:53

drone hovering outside my office. So, um

8:56

we basically have him closer to me than

8:59

my access point. And that is the goal

9:01

here. Now, the question is is how steady

9:03

is his hat? Um so, oh, he got even

9:07

closer. He's really freaking me out now

9:09

cuz he's spying on me.

9:13

I wish I could open the window. Oh,

9:14

that's getting close to the glass. He's

9:16

being brave. Um I'm going to wave just

9:19

in case he can see me. He said it won't

9:21

reflect because it's Oh, he's waving

9:23

back. There you go. There's a drone

9:24

wave. So, um Okay. The um So, Rob, now

9:30

you're closer to my office.

9:32

Yes. Right beside you.

9:35

Question is, can you can you make it or

9:38

Rob is right next to me in the room next

9:40

door. Can we make it? Can we share a

9:41

screen? Can we show this how how this

9:43

works?

9:44

Yes, we can. Bear with me one second and

9:48

cross our fingers.

9:50

So

9:51

really close to the

9:52

share my screen.

9:54

Okay, should be looking at it now. So

9:57

first of all, the pineapple is

10:00

broadcasting a wireless network which I

10:03

am going to connect to. Okay, so this is

10:06

basically a management network. This is

10:07

just for configuration of the pineapple.

10:09

Now bear with me.

10:11

No pressure because if you drop that

10:13

drone, Rob loses the signal.

10:16

Uh just a second.

10:21

Now, the reason this webinar is not

10:22

going to be over 20 minutes because

10:24

that's about the length of the battery

10:25

on that drone. Pineapple. Um, so yeah,

10:29

just to um sort of elaborate a little

10:30

bit on what you mentioned, Danny. So, I

10:33

wasn't previously aware of this either,

10:35

but basically when your device is

10:39

looking to connect to a wireless

10:40

network, it's actually broadcasting what

10:42

wireless network it is looking to

10:44

connect to. Okay? So if you have a

10:46

network at home called Rob's network,

10:48

your phone is effectively going, is

10:49

there a Rob's network out there? This is

10:51

able to pick that up and impersonate

10:54

that network. So to encourage your

10:56

device to connect to it. So first thing

10:59

you'll notice on this uh admin page on

11:01

the pineapple CPU is actually pretty

11:02

hammered on this. Now there's a really

11:04

good reason for that, which is I plugged

11:06

this or turned this pineapple on at an

11:09

event I was at in London recently. Now,

11:11

it was on for probably no more than an

11:13

hour, but in that hour, it picked up, as

11:16

you can see here, 481

11:19

SSIDs.

11:20

Okay, so that's 481 separate wireless

11:24

networks that it saw devices trying to

11:26

connect to. So, added them to its pool

11:30

so it can then impersonate those

11:32

networks. Bear with me a second. Okay.

11:35

Uh but as you can see the CPU on the uh

11:38

pineapple is pushed pretty hard because

11:40

it's got 481 SSIDs that it's trying to

11:43

impersonate.

11:45

Um the other let me just go through the

11:48

interface a little bit. So it's all very

11:50

well and good having SSIDs. It's all

11:52

very well and good having machines

11:53

connecting to this thinking there's

11:55

something else. Question then becomes

11:57

what do you do with that? So if you get

11:59

devices, if you get people's phones,

12:01

people's laptops etc. connect to connect

12:04

through the Wi-Fi pineapple. What do you

12:07

do with that? Okay, so effectively what

12:09

you do with it is a man-in-the-middle

12:10

attack. Okay, so you can broadcast and

12:13

you can set up what is called an evil

12:14

portal. Now an evil portal in Wi-Fi

12:17

pineapple terms is basically a it mimics

12:20

a Google login, a Facebook login, a

12:23

Twitter login, a Office 365 login. So

12:26

that loon page that you get when you go

12:29

to log into Office 365, this mimics

12:32

that. Okay. So basically when you try

12:34

and connect to it, you connect through

12:35

that network. Next minute you get a

12:37

pop-up saying you need to log into

12:38

Office 365. Most people see that fairly

12:42

regularly. Oh yeah, sorry. As I said,

12:44

flaky. Oh, back end seems to be running,

12:46

but there's no socket available. That

12:48

will be because of the 481 wireless

12:50

networks. But yeah, point is it will be

12:52

it will broadcast a uh uh SSID. You

12:56

connect to that SSID. It then presents a

12:59

login page for Gmail or Office 365 or

13:02

whatever your target uses. And again the

13:05

beauty about this is you can target it

13:06

to a particular person. So you know we

13:09

knew we know Danny for example uses say

13:12

Google. We can pop up a evil portal for

13:16

Google. So the question is Rob, if you

13:18

connect to that

13:20

Wi-Fi now, are you able to connect to

13:22

anything on your phone and show us?

13:25

Um, I'm not actually broadcasting. So,

13:28

as you saw, there was 481 Wi-Fi networks

13:31

in the vicinity. Let me just see. Uh,

13:34

I'm not broadcasting all 481 at the

13:37

moment because the pineapple is

13:39

struggling as it is already. Um, bear

13:42

with me one second and I will try and do

13:45

that.

13:49

Sorry, go ahead. I

13:50

I was going to say we probably should

13:52

have uh made everyone disconnect their

13:54

Wi-Fi and not have so many networks

13:56

broadcasting.

13:57

Yeah. Yes. Um so these are the uh and

14:01

again my apologies for being a little

14:03

bit slow. It is a outside the window and

14:05

b um running a lot of stuff. Um you can

14:10

see here you've got different options

14:11

for the uh the Pine AP itself. So

14:13

passive mode as you can see following

14:15

features are enabled. SSI SSID pool

14:18

collection and event logging active is

14:21

full collection and also broadcasting as

14:23

well. And you've got advanced options

14:24

there too. Um this pineapple's

14:27

struggling badly.

14:29

I don't know. 80% of people had

14:31

confidence in you Rob.

14:33

In confidence in us, Danny. Confidence

14:35

in us.

14:36

No. No. This one's going on you. If it

14:38

doesn't work, it's going on you. You

14:40

know what I say to my kids? All your

14:41

successes are my successes. All your

14:43

failures are your own.

14:46

Tell you what, you talk for a minute.

14:47

I'm just going to try and reboot this

14:48

bad boy.

14:49

Yeah. Okay. Well, you know, probably

14:53

what I'm going to do is I'm going to

14:54

give you a few hips on what you can do

14:56

to reduce your likelihood of being

14:58

killed by a pineapple um or a drone

15:01

outside your office window. It's kind of

15:03

weird having this guy looking in my

15:04

office window on a camera right now. Um,

15:06

so first thing you can do is if you

15:08

don't want someone to put a camera

15:09

outside your office window is shut the

15:10

blinds. So, uh, that's going to be my

15:13

thing now. I don't trust people not to

15:14

look in from drones. Um, but you can do

15:17

a few things to reduce your likelihood

15:18

of a successful cyber attack. Now, the

15:20

actual pineapple itself, it's very hard

15:22

to protect yourself from. You have a

15:25

um, you know, because they're boarding

15:27

an SSID, you're bing, you're connecting

15:29

to an SSID, you really don't know what

15:31

you're connecting to. So, it's difficult

15:34

for you to say, "I'm not going to

15:35

connect to the wrong SSID." Few things

15:37

you can do is one is don't connect to

15:39

public networks when you don't need to.

15:40

Like, use use your hotspot on your phone

15:44

and and use that through cable if you

15:46

can, but if they don't know that you're

15:48

broadcasting on Danny's iPhone, they're

15:49

not as likely to just get caught. The

15:51

other thing is now Rob's going to show

15:53

you hopefully if it works a Google or a

15:56

Office 365 login page, which will

15:58

obviously steal the credentials of

16:00

anyone who logs into it. Um, make as a

16:02

user, make sure you're logging into the

16:04

page you expect to be. Just because it

16:05

pops up on your phone, it doesn't mean

16:06

it is what it says it is. But as an IT

16:09

professional, you have to protect your

16:11

users from them doing things they

16:13

shouldn't do. So, make sure you've got

16:15

dual factor authentication on your

16:16

account. There is so many ways someone

16:18

can fish somebody's details. Pineapple

16:20

is just one of those ways. They can send

16:22

links. People can just log into someone

16:23

else's computer with a key logger on it.

16:25

I mean, even at Zero Trust World last

16:26

year, we had G2 had a booth set up and

16:29

they were getting people to write

16:30

reviews on Threat Locker, but they

16:31

wanted to prove that you're a Threat

16:33

Locker client. They were asking people

16:34

to log into their Threat Locker accounts

16:36

on their computer and they collected

16:38

about 50 reviews like that. Now, they

16:39

weren't doing it as a stitchup. I didn't

16:41

even know they were doing it. And I said

16:43

it, why why did people just put their

16:45

threat locker password into somebody

16:46

else's computer? Even IT people at cyber

16:49

security conferences make mistakes. Um,

16:52

so there's lots of ways you can be

16:53

fished, but using dual factor

16:54

authentication is the control that you

16:56

have control over in it. It's the thing

16:58

you can do to stop your users

17:01

having their data eaten. Um, other

17:03

things you can do is obviously assume

17:04

that someone's going to get on your

17:06

network and and make sure you harden

17:08

your environment. Make sure that if they

17:09

do get onto your Wi-Fi themselves cuz

17:11

they potentially get onto your Wi-Fi

17:13

using this collecting passwords. Make

17:15

sure that your servers have uh firewalls

17:18

on them and that only trusted devices on

17:20

your network can access your servers. So

17:21

if you're using threat lock you can use

17:22

our network access controls to allow

17:24

only even using DHCP only certain

17:27

devices to connect to your servers. It's

17:29

a great way of protecting yourself if

17:30

someone gets on your network and of

17:32

course using um a cable. I mean it's it

17:36

sounds really simple. We use cables in

17:38

our office for primary computers. We

17:40

don't use Wi-Fi for primary computers.

17:41

We use them if we're moving our laptops

17:42

around, but it reduces your probability

17:44

of someone intercepting

17:46

your network connection when they need

17:48

to. One of the thing you can do, okay,

17:50

if you got an iPhone, and I'm going to

17:51

show you mine in pure embarrassment, um,

17:55

is if you go into your iPhone and you go

17:56

to your wireless networks. I'm connected

17:58

to just felt like a staff here. Don't

17:59

know how well my screen Oh, my camera's

18:01

showing. Let me pull up here. So, I'm

18:03

connected to like a staff. If you got an

18:05

Android, it's slightly different

18:06

instructions. Um, if you click the edit

18:09

button in the top right, this will show

18:11

you a list of all networks you're trying

18:12

to connect to. The more networks you're

18:14

trying to connect to, the more likely

18:16

you're going to connect to someone's

18:17

pineapple who just set it up in a

18:18

broadcast. If you don't need these

18:20

networks, just click the red button and

18:22

click delete. Apple did not add a delete

18:25

all function. I'm intrigued to know if

18:26

Android has a delete all function on

18:27

there, but they don't. So, you have to

18:29

go through each one. Apparently, I've

18:30

connected to a lot of wireless networks.

18:32

Go through and clean it up.

18:34

Don't don't auto to connect to networks

18:36

if you don't need to because then if

18:38

someone broadcasts a random signal,

18:39

you're less likely to get hit. But most

18:41

importantly, assume you're going to

18:42

connect to a bad Wi-Fi. If you're

18:43

connecting to public Wi-Fi, assume the

18:45

network you're connected to is bad and

18:47

put other controls in place. Make sure

18:48

you got firewall on your computer and

18:50

make sure you're blocking inbound

18:51

traffic. Make sure you're doing

18:52

everything else. Um, okay, Rob, any

18:55

luck?

18:56

Uh, yeah, let me show you what I've got

18:59

now. It is currently behaving. It may

19:02

not behave for too much longer, but

19:03

let's see how we get on. So, first of

19:05

all, as I mentioned earlier, we've got

19:07

482 SSIDs in the pool. They were picked

19:10

up from, as I said, that event I was at

19:12

in London and everybody trying to

19:14

connect to it. Um, interestingly enough,

19:16

I did notice some of the wireless

19:18

networks here. Park Plaza County Hall,

19:21

that is a very pleasant hotel actually

19:23

just outside London that I stayed in

19:26

about two weeks before this event took

19:28

place. Uh likewise Park Plaza, Victoria,

19:31

London. So again, my devices had

19:34

connected to those networks at some

19:35

stage. This picked up the fact that my

19:38

devices were trying to connect to those

19:40

networks and basically picked them up

19:42

and was able to spoof them. So you'll

19:45

see here and Dublin airport Wi-Fi is

19:47

here as well. Lots of different things,

19:49

but these are all individual SSIDs,

19:52

individual networks that this has

19:54

detected people's devices trying to

19:57

communicate with. Collective Canary

19:59

Wararf again very nice hotel in London

20:00

that we stayed in some time ago. So you

20:02

can see here these are all picked up

20:04

automatically by the pineapple. Now

20:06

you'll notice here we have options. So

20:08

if I want to impersonate those networks,

20:11

okay, so basically try and get trick

20:12

people's devices into connecting to it.

20:15

All I do is impersonate all networks.

20:17

Now this is probably going to uh to take

20:19

a moment. Okay, but what you

20:21

can you can you just impersonate one

20:22

network?

20:23

Uh that is a very good question. Can I

20:25

just impersonate I think somebody asked

20:26

that question. Bear with me. Uh,

20:29

no. We have a we have a lab one set up

20:31

called lab something. Can you do that

20:33

one or not?

20:34

No, probably not. It's a short answer.

20:36

Let me just do impersonate all.

20:39

The other thing I was going to say by

20:41

the way just to show the evil portals

20:42

because somebody had asked questions

20:44

about the evil portals. So this is how

20:45

you impersonate the office 365 loon, the

20:48

Google loon, etc. So you will see as

20:51

well, bear with me a second. Um I think

20:54

this may be posted to the chat as well

20:56

where you can actually download these

20:57

portals from. So it's basically just a

20:59

web server running on the device. Okay,

21:01

this is the standard evil portal that

21:03

effectively it comes with. Okay, you can

21:05

see this is a preview page of it. Okay,

21:07

which is basically just a default page.

21:10

But again, imagine that as a Google

21:12

login page, as an Office 365 Live login

21:14

page. You wouldn't know any different to

21:15

the real thing. You type in your

21:16

username and password and then next

21:17

minute they've got it. Um you can look

21:19

at the logs on this as well. So if and

21:21

when somebody does type in those

21:24

credentials, basically it's logged here

21:25

and available to uh to use and to

21:30

misuse.

21:31

Okay. Can you connect to it?

21:33

Can I connect to it? Sorry. Let me just

21:35

see if we've got some

21:36

connects here.

21:39

Um

21:40

I think it's starting to broadcast

21:43

several 482 Wi-Fi networks. So just bear

21:46

with me one second.

21:51

I'm going to see what I can see.

22:00

Oh, I'm starting to see loads of them.

22:02

So, I'm just going to pick one. I'm

22:03

going to say um UK Sex Summit. Let me

22:06

connect to that.

22:07

That was the event we were at.

22:09

So, it says unable to join UK set

22:12

summit.

22:13

Try another one.

22:15

Uh what about guest? Let's see if any of

22:16

these work. Oh, no. Guest looks like a

22:18

real one. It's asking for a password.

22:21

Um,

22:23

[Music]

22:28

when you do connect, by the way, we will

22:30

see notifications here. So, you'll see

22:32

on the interface, it shows me that these

22:35

are back from November when I actually

22:37

played with this. But you'll see here we

22:39

can see the devices that have connected,

22:42

disconnected, connected, disconnected.

22:43

And again, this is where it's getting

22:44

all those SSIDs from.

22:48

Okay, I am connected to UK sets summit

22:50

and I got congratulations

22:51

actually got given I didn't get a

22:53

thingy. I just got given the evil portal

22:55

screen. You didn't show the Microsoft

22:56

one. So immediately it shows me this

22:58

screen.

22:59

So I guess you didn't change the

23:00

content. But what you can do is you can

23:01

pretty much get it to show you any HTML

23:03

and collect any data. So it says

23:05

evil login screen. So this is obviously

23:07

the template.

23:08

Exactly.

23:09

If if I I guess if I click authorize

23:12

um it says go away. Um, so

23:17

I am connected.

23:18

There is a post there. I mean, just

23:19

Google evil portals. You'll find the

23:21

list of them anyway. There are current

23:23

ones there. Instagram, Facebook, Click,

23:25

O2, Starbucks, Twitter, Yahoo, um, etc.

23:29

And I know there is an Office 365 one

23:30

available as well.

23:32

So, so what I'm going to do is I'm going

23:33

to ask people to put a vote. Do we

23:36

consider that a success? Because I

23:37

didn't actually get an Office or G Suite

23:39

login. I'm going to ask

23:41

you a portal login. I got a evil portal

23:44

login. I mean,

23:45

who listen? Who isn't going to trust an

23:47

evil portal login?

23:49

Oh, I don't know. Why don't we put a

23:50

vote to that? Gabby, I'll let you put

23:52

that that out there. Do we consider a

23:55

evil portal login a success? Um, despite

23:58

the fact it was on a Wi-Fi connection

24:00

through probably 3/4 inch glass or at

24:02

least half inch glass here. Uh, but

24:05

Gabby, I'll let you uh throw that poll

24:06

out there. And while she's doing that,

24:07

I'm going to answer some questions.

24:09

There's a lot here. A lot of great

24:10

products. Thanks for continued support.

24:12

The test will be such a spectacular if

24:14

it takes down Zoom. No such luck. We are

24:16

using cables. So um it says here I'm

24:19

actually going to correct this one. It

24:20

says 80% of people are confident with

24:21

Threat Locker. I don't think this is

24:23

about Threat Locker. I think you should

24:25

be confident in your security if you put

24:26

good controls in place. Threat Locker is

24:28

a set of tools. Um you know we can allow

24:30

you to stop bad software running. We

24:32

allow software to be limited what it can

24:34

do. We allow network controls. But it

24:36

it's it's not so much about being

24:38

confident about Threat Locker, but being

24:40

confident about tangible controls that

24:42

harden your environment. And threat

24:43

locker, of course, we're awesome. We

24:44

make it easy. We back it up with

24:46

support. So, I appreciate people saying

24:48

that. Anyway, I don't know the answer to

24:49

this question. Do you know does it does

24:51

it do full MITM pass through once

24:54

authenticated?

24:55

Yes,

24:57

there you go. Answered. Um, okay. So,

25:00

the anti solution, I think we've already

25:01

go over that. This isn't something you

25:02

can just buy. It's a case of having good

25:04

security hygiene in your system. You

25:06

making sure people are crashing in your

25:08

office. Use Ethernet where you can. Make

25:10

sure your phone's not autoconnecting to

25:11

other networks. And make sure that

25:14

you're aware that when you do connect to

25:15

a network, you are potentially

25:18

broadcasting.

25:19

So, um

25:20

I do also have spectacularly amazing

25:22

news. Danny,

25:23

go on.

25:24

Result of the poll is in

25:27

Yeah, I saw that. And look, 75% said

25:29

yes.

25:29

75% people have ran wrong.

25:33

So, so, uh,

25:34

I'm just going to end the poll now in

25:35

case anybody changes their mind.

25:37

Yeah, there you go. Could, um,

25:42

could you do a team that we're the

25:45

fishing email for the evil portal?

25:49

I I I'm guessing that's asking, can you

25:51

use the evil portal outside of the

25:53

pineapple? The answer is yes, you can.

25:54

They're just HTML files that can be

25:56

hosted on anything. But um okay so

25:59

somebody asked will a VPN provide

26:00

sufficient security if a user connects

26:02

to one of those impostor SSIDs. Um it

26:05

the VPN will encrypt traffic throughout.

26:09

So it's technically yes is the answer.

26:11

They could do man attacks I guess on an

26:13

SSL but I think a VPN is going to

26:16

provide sufficient where you're going to

26:17

have a problem is when the user connects

26:18

and it pops up with their G Suite

26:20

account. They're not on a VPN at that

26:22

point. It's not going to help you

26:23

because that's going to go to that local

26:24

IP address. Yeah, VPN won't protect you

26:27

from the able portal.

26:28

Um, so toggle on your device VPN. What

26:32

happens when you connect? Um, so again,

26:34

if the the VPN won't if you if you turn

26:37

on your device VPN, the VPN traffic is

26:38

encrypted end to end. So, you should be

26:40

good. The and the Pineapple does pick up

26:42

all requested SSIDs, both two and four,

26:46

but it's um

26:48

obviously you don't want to pick up too

26:49

many. Normally, you want to target who

26:51

you're after. Um, so somebody asked, "Is

26:53

it worth turning off the Wi-Fi while I'm

26:55

in public?" Look, so I think I think

26:56

when we're thinking about security,

26:57

we're thinking about how do we balance

26:59

security and convenience? Um, generally

27:02

turning off Wi-Fi is more secure than

27:04

not turning it off, but it it so it's

27:06

not a bad idea to do that. Um, if but

27:09

it's also useful to use Wi-Fi. I mean,

27:12

there's a reason so many of them on my

27:13

phone. I generally use my hotspot. I

27:14

only use Wi-Fi when I need to use Wi-Fi

27:16

and I have a massive list. So, it's not

27:18

always possible to just turn off Wi-Fi,

27:20

especially if you're in New York City

27:22

for the day. Um, because those those

27:24

buildings seem to block LTE like mad.

27:27

Uh, I'm just I'm actually going to You

27:29

mentioned steal credit card information.

27:30

The evil portal is where it's really

27:32

useful because one of the things that

27:34

attackers use this for is

27:36

presenting paid Wi-Fi pages. So, if you

27:40

go on to an airline or you go to an

27:42

airport where you have to pay for Wi-Fi,

27:44

um this is where you can say, "Okay, you

27:47

got to pay for Wi-Fi." They'll replicate

27:48

those pages and then they'll say, "Here,

27:50

give me your credit card number." And

27:51

just like logging in, you can see that

27:53

data. So, somebody asked, "Can threat

27:55

locker mitigate via network controls?"

27:57

Um, so it's not going to stop somebody

27:59

getting who is it connecting to a rubber

28:02

do sorry not rubber ducky a pineapple

28:03

but threat locker will allow if someone

28:05

gets onto your network by using a

28:07

pineapple collecting information getting

28:08

onto your LAN or potentially feeling

28:10

stealing your Wi-Fi password then once

28:13

that device is on your Wi-Fi it won't be

28:14

able to talk to your server. If you are

28:16

a threat client and you're not already

28:17

using our network access controls come

28:19

into support talk to your SE and say how

28:22

do I get the network access controls to

28:23

make sure my server is locked down to

28:24

only my devices.

28:26

um being you are being used. My wife is

28:30

going to kill me because I'm gonna take

28:31

one home. You can buy these on Hack

28:33

Five, by the way. So, and this is a very

28:36

quick learning uh tool on this, but it's

28:38

not your wife that's going to kill you.

28:40

See what happens when you deth your home

28:41

Wi-Fi with your kids.

28:43

It's fine. Especially, I mean, I don't

28:45

know if you've got your kids aren't

28:46

teenagers yet, Rob, but when you take

28:48

Wi-Fi away from teenagers, that's evil

28:51

portal So, uh but it really is

28:55

worth taking Um, a little true story at

28:58

Zero Trust World last year, we had

28:59

serious problems with the Wi-Fi. Uh,

29:01

because we did a demonstration of the

29:02

Wi-Fi pineapple and then we went up to

29:04

do our other labs, our rubber ducky

29:05

labs, our metasloit labs, and no one

29:07

could get on the Wi-Fi and we were like,

29:09

"Come call the hotel, complain the Wi-Fi

29:11

is crap. What's going on?" And it turns

29:13

out we were deing everyone from the

29:15

Wi-Fi because someone

29:16

That might have been me, Danny.

29:18

Yeah, I blame you. Um, those guys

29:21

downstairs, you can land that drone now.

29:22

Uh if the window would open, I'd throw

29:24

something at it, but it doesn't. Oh, one

29:26

other thing I am going to show you a

29:27

couple of things. Um when if we can get

29:29

the drone upstairs, you can buy a clip,

29:32

which is somewhere here, one of these to

29:35

attach things to your drone. Um rather

29:37

than strapping it on the back with tie

29:39

wraps, um little trick, it doesn't work.

29:42

Mine is here. Smash the pieces, it

29:44

broke. Um so you don't need to do that.

29:46

Just put the white the pineapple

29:47

strapped onto the back. The other thing

29:49

is um when you do that in the DJI app,

29:53

there is a setting that turns off motion

29:55

sensor because what happens if you strap

29:56

a pineapple onto the top without turning

29:59

off obstacle avoidance is it tries to

30:02

avoid that obstacle attached to the top

30:04

and it smashes up your office which is

30:06

what happened yesterday.

30:07

So the other thing is which I I I did

30:10

learn. So when we use the strap here we

30:12

thought I mean this seems like the

30:13

logical thing. You can carry various

30:15

payloads. You put it in the bottom you

30:16

strap it. What we did, and I thought I

30:18

had this here somewhere. Oh, yeah. This

30:20

what we did. Oh, here's the rest of the

30:22

thing. So, here's the broken clip, by

30:23

the way. That did not work so well, but

30:25

we we had the clip on there, or half a

30:27

broken clip, and we had this bag hung

30:29

down from tie wraps. Now, little physics

30:33

lesson that I learned yesterday, and I

30:34

should really know this is when you put

30:35

an open bag underneath a propeller

30:38

blade, it fills with air, which means

30:40

you get a se whatever weight gets pushed

30:42

down, it gets pushed pulls the drone up,

30:45

also pulls it down. Is that like a

30:47

reverse hot air balloon?

30:48

Yeah. So, reverse hot air. So, make sure

30:51

you close the bag if you do use a bag

30:52

and maybe don't use a threat like locker

30:54

bag. So, uh but that that was an

30:56

interesting fact I learned yesterday.

30:58

So, if you are trying to fly this and um

31:01

uh hack something, whether you're just

31:02

flying for fun and you're trying to

31:03

bring payload, I did we did learn a lot

31:05

of things yesterday. Um we managed to

31:08

hit a door frame. We landed in someone's

31:09

lunch and a few people literally lost

31:11

their their heads in the office. I also

31:14

don't recommend you practice inside. So,

31:16

um, thank you everyone for joining us

31:18

today and hopefully enjoy the rest of

31:20

your weekend. Thank you Jason and Gabby

31:22

for organizing and Rob as well.

31:26

[Music]

Get the TLDR of any YouTube video

Transcribe, summarize, and repurpose videos in 125+ languages — free, no signup required.

Try YouTLDR Free