LogoLogo
  • 🤩Welcome!
  • Buffer overflow
    • Remote Buffer Overflow
      • Crashing the Application
      • Controlling the EIP
      • Finding Bad Characters
      • Finding a Return Address
      • Generating Shellcode
      • Getting a Shell
  • Wireless Penetration Testing
    • Wifi Pineapple - Tetra
      • Setup
      • Firmware Upgrade
      • Capturing Wireless Handshake
      • Cracking WPA2 Handshake
      • PineAP
      • Modules
  • PortSwigger Labs
    • Authentication
      • Username enumeration via different responses
      • Username enumeration via subtly different responses
      • Username enumeration via response timing
  • TryHackMe
    • 🎄Advent of Cyber 3 (2021)
      • [Day 1] Save The Gifts
      • [Day 2] Elf HR Problems
      • [Day 3] Christmas Blackout
      • [Day 4] Santa's Running Behind
      • [Day 5] Pesky Elf Forum
      • [Day 6] Patch Management Is Hard
      • [Day 7] Migration Without Security
      • [Day 8] Santa's Bag of Toys
      • [Day 9] Where Is All This Data Going
  • Google Cloud Computing
    • ☁️Cloud Computing Fundamentals
      • Getting Started with Cloud Shell and gcloud
      • Creating a Virtual Machine
      • App Engine: Qwik Start - Python
      • Cloud Functions: Qwik Start - Command Line
      • Kubernetes Engine: Qwik Start
      • Set Up Network and HTTP Load Balancers
Powered by GitBook
On this page
  • Web Portal
  • URL
  • Changelog
  • Secure Setup
  • Login

Was this helpful?

  1. Wireless Penetration Testing
  2. Wifi Pineapple - Tetra

Setup

This subsection covers the setup process of the Tetra.

PreviousWifi Pineapple - TetraNextFirmware Upgrade

Last updated 3 years ago

Was this helpful?

Once the 🍍 is booted up and connected to a machine via the provided USB Y cable, the machine it's connected to should receive an IP address via DHCP as shown below.

Web Portal

URL

Accessing the following link will bring up the 🍍's admin dashboard for first-time configuration

Changelog

If the changelogs show up, the 🍍 has been set up properly and is now ready for configuration.

It is adviced to plug in a LAN cable into the 🍍 at this point to be able to check for updates & download community made modules.

Secure Setup

User account & Timeozone

In this section, we set the root user's password and the timezone in which the device is located.

Radio Configuration

Management AP is used by the administrator of the 🍍 to be able to remotely administer the device over wifi.

Open AP is the network that would be shown to our "targets".

No actual targets here.

Radio Country code is pretty self-explanatory.

Filters & Firewall

Client Filters are used to determine which "targets" you allow to interact with your network.

SSID FIlters are used to control if clients of other SSIDs are able to interact with the pineapple

EULA

And of course we gotta accept the License and EULA.

Using this device in public or against any network that you do not personally own, is illegal.

Completion of setup

Once the following page appears, the 🍍 is good to go and we can start attacking! [ourselves ofcourse]

Login

root:root

link can be used to access the web portal after setup!

http://172.16.42.1:1471/
This
Web Interface
Change Logs
Radio Configuration
Filters & Firewall Configuration
Login Form
Dashboard