WiFi Pineapple Mark VII
  • WiFi Pineapple Mark VII
  • Setup
    • Connecting the WiFi Pineapple
    • Setting up your WiFi Pineapple
    • Connecting to the WiFi Pineapple on Linux
    • Connecting to the WiFi Pineapple on Windows
    • Setting up the WiFi Pineapple over WiFi
    • Setup by USB Disk
  • UI Overview
    • Introduction to the UI
    • Dashboard
    • Campaigns
    • PineAP
    • Recon
    • Handshakes
    • Modules
    • Settings
    • Cloud C²
  • Developer Documentation
    • Developer Resources
    • Contributing to the Module Repository
  • WiFi Basics
    • Introduction to WiFi
    • Radios and Chipsets
    • Stations and APs
    • Transmit Power
    • Antennas
    • Channels and Regions
    • Protocols
    • Modes of Operation
    • Logical Configurations
    • MAC Addresses
    • Broadcast and Multicast MAC Addresses
    • SSIDs
    • 802.11 Frame Types
    • 802.11 Frame Structure
    • Management Frames
    • Frame Injection
    • Association and State
  • FAQ / Troubleshooting
    • MacOS Support
    • Establishing an Internet Connection
      • Configuring a Client Mode Connection
      • ICS on Linux
      • Configuring ICS on Windows
      • Configuring a USB Ethernet Adapter
    • Password Reset
    • Factory Reset and Recovery
    • WiFi Pineapple Updates
    • WiFi Pineapple Beta Updates
    • Compatible 802.11ac Adapters
  • Extras
    • MK7 LED Mod Installation
    • MK7 Kismet Case Installation
Powered by GitBook
On this page

Was this helpful?

  1. WiFi Basics

Frame Injection

It should be apparent that much of WiFi operation relies on trust, particularly with regard to the validity of source and destination addresses. Given these values may be spoofed, it’s with the technique of frame injection that various attacks may be carried out.

Simply put, frame injection is the process of transmitting any WiFi frame desired, regardless of an association with any station. One example may be a beacon frame injected into the air with specific values set to aid the penetration tester.

Another example may be a deauthentication frame with a spoofed source and destination address. Not all radios and software support this ability. This technique is leveraged by the PineAP suite for a number of attacks using the WiFi Pineapple hardware.

Last updated 3 years ago

Was this helpful?