Pineapple Hacking Device Resembles a Carbon Monoxide Detector
n the world of security penetration testing, researchers often rely on stealth and deception when testing a target. At the Defcon security conference in Las Vegas, a new level of penetration testing deception was demonstrated Aug. 8 with a WiFi hacking device that could be hidden in what appears to be a standard carbon monoxide detector casing.
The WiFi penetration device in question is known as a Pineapple, developed and built by Hak5. At Defcon 2014, Pineapple developers Darren Kitchen and Sebastian Kinne demonstrated the new Pineapple Mark V hardware, including new firmware and a new casing for deception. Kitchen and Kinne are no strangers to Defcon and had demoed the Pineapple Mark IV device at the 2013 event.
"People use open WiFi networks a ton, and lots of people now bring their own devices to work," Darren said. "As a penetration tester, it all makes it more interesting for us."