WiFi Pineapple: Network Penetration Testing and Wireless Auditing Guide
Wireless networks are one of the most common attack surfaces in any organization. The WiFi Pineapple, built by Hak5, is purpose-designed for wireless penetration testing and security auditing. It automates the most common wireless attacks and provides a professional platform for assessing WiFi security.
This guide covers what the WiFi Pineapple does, how to set it up, and how to use it effectively in authorized security assessments.
What Is the WiFi Pineapple?
The WiFi Pineapple is a wireless auditing platform that simplifies the execution of sophisticated WiFi attacks. It is essentially a specialized Linux device with dual radios, a web-based management interface, and a modular architecture that lets you install additional attack and reconnaissance capabilities.
The current generation — the WiFi Pineapple Mark VII — features:
- Dual-band radios (2.4 GHz and 5 GHz)
- Web-based management dashboard (PineAP Suite)
- USB-C power and data
- Expandable storage via USB
- Cloud C2 compatibility for remote management
Key Features and Specifications
PineAP Suite
The core of the WiFi Pineapple is PineAP, an intelligent access point spoofing engine:- Beacon Response — automatically responds to probe requests from client devices
- Evil Twin — creates convincing copies of legitimate access points
- Broadcast SSID Pool — advertises multiple SSIDs simultaneously
- Client Tracking — monitors which devices are probing for which networks
- Logging — records all wireless activity for analysis and reporting
Dual-Radio Architecture
- Radio 0 (Management): Handles the management interface and upstream internet connection
- Radio 1 (Attack): Dedicated to PineAP operations, evil twin deployment, and client interaction
Module System
The WiFi Pineapple supports installable modules that extend its capabilities:- Evil Portal — customizable captive portal for credential harvesting
- DWall — real-time HTTP monitoring and URL logging
- DNSspoof — DNS manipulation for traffic redirection
- Nmap — network scanning integration
- Responder — NTLM hash capture for Windows environments
- tcpdump — packet capture for detailed traffic analysis
Cloud C2
Hak5 Cloud C2 enables remote management:- Deploy the Pineapple at a client site
- Manage and monitor from anywhere via encrypted tunnel
- Download logs and captured data remotely
- Run modules and configure PineAP without physical access
Setting Up Your WiFi Pineapple
Initial Configuration
- Connect via USB-C to your laptop
- Navigate to 172.16.42.1:1471 in your browser
- Complete the setup wizard — set admin password, configure networking
- Update firmware and install modules from the module manager
Network Configuration
The WiFi Pineapple needs an upstream internet connection for certain attacks (DNS spoofing, captive portals with credential forwarding). Options include:- USB tethering from your phone
- WiFi client mode — connect Radio 0 to an existing network
- Ethernet via USB adapter
Module Installation
- Open the Modules panel in the web interface
- Browse available modules
- Install to internal storage or USB
- Configure module settings and launch
Real-World Penetration Testing Scenarios
Scenario 1: Evil Twin Assessment
Objective: Test whether employees connect to rogue access points.- Survey the target environment to identify SSIDs in use
- Configure PineAP to broadcast the target SSID
- Enable Beacon Response to answer client probe requests
- Monitor which devices associate with the evil twin
- Deploy Evil Portal module with a corporate-looking login page
- Capture credentials submitted through the portal
- Document findings with timestamps, device MACs, and captured data
Scenario 2: Captive Portal Credential Harvesting
Objective: Demonstrate the risk of credential reuse on untrusted networks.- Create a convincing captive portal that mimics a hotel WiFi login, corporate portal, or social media login
- Deploy the Evil Portal module with the custom template
- When clients connect, they are redirected to the captive portal
- Captured credentials demonstrate the risk of reuse
Scenario 3: Man-in-the-Middle Analysis
Objective: Assess whether sensitive data is transmitted in cleartext.- Set up the evil twin with internet forwarding enabled
- Use the DWall module to monitor HTTP traffic in real-time
- Deploy tcpdump for full packet capture
- Analyze captured traffic for unencrypted credentials, session tokens, or sensitive data
- Identify applications and services not using TLS/HTTPS
Scenario 4: Wireless Reconnaissance
Objective: Map the wireless environment of a target facility.- Enable passive scanning on both radios
- Use Recon mode to enumerate all access points and clients
- Identify hidden SSIDs through client probe analysis
- Map relationships between access points and client devices
- Export data for reporting
Best Practices for Professional Assessments
Before the Engagement
- Obtain written authorization specifying the scope of wireless testing
- Define which SSIDs and frequency bands are in scope
- Clarify whether credential capture is authorized
- Establish communication procedures with the client IT team
During the Engagement
- Log everything — timestamps, actions taken, results observed
- Use the built-in logging features in PineAP and modules
- Take screenshots of the dashboard during active operations
- Minimize impact — deauthentication attacks can disrupt production networks
- Monitor for unintended victims connecting to your evil twin from outside the scope
After the Engagement
- Export all logs and captured data securely
- Wipe the Pineapple of client data
- Prepare a detailed report with findings, risk ratings, and remediation recommendations
- Present results to stakeholders with clear explanations of each vulnerability
Who Should Buy This?
The WiFi Pineapple is designed for:
- Professional penetration testers conducting wireless security assessments
- Red team operators deploying wireless attacks as part of comprehensive engagements
- IT security teams validating their wireless security controls
- Security trainers demonstrating wireless attack techniques in controlled environments
- Researchers studying wireless protocol vulnerabilities
Conclusion
The WiFi Pineapple remains the gold standard for wireless penetration testing platforms. Its combination of dual-radio architecture, the PineAP engine, modular attack capabilities, and remote management through Cloud C2 makes it the most capable and convenient tool available for wireless security assessments.
For penetration testers and security professionals, the WiFi Pineapple eliminates the need to manually configure Linux tools for each wireless attack scenario. It packages years of wireless attack research into a turnkey platform that you can deploy in minutes.
Important: The WiFi Pineapple is a professional security tool. Always ensure you have explicit written authorization before conducting any wireless security testing. Unauthorized interception of wireless communications is illegal in most jurisdictions.