Skip to content

Latest commit

Β 

History

History
86 lines (64 loc) Β· 1.9 KB

File metadata and controls

86 lines (64 loc) Β· 1.9 KB

🍍 WiFi Pineapple Quick Reference Card

⚑ IMMEDIATE ASSESSMENT (30 seconds)

python3 pineapple_detector.py --quick

🚨 THREAT RESPONSE

βœ… If "NETWORK APPEARS SECURE"

  • βœ… Safe to use network
  • βœ… Continue normal activities
  • βœ… Run full test when convenient

❌ If "SECURITY THREATS DETECTED"

  • πŸ”΄ DISCONNECT IMMEDIATELY
  • πŸ“± Switch to cellular/trusted network
  • πŸ” Investigate before reconnecting
  • πŸ“ž Report to network admin

🎯 COMMON ATTACK INDICATORS

Sign Threat Action
DNS pointing to private IPs Pineapple/MITM DISCONNECT
SSL certificate errors Certificate manipulation DISCONNECT
Firewall disabled System exposure ENABLE FIREWALL
VNC/SSH exposed Remote access risk SECURE SERVICES

⚑ EMERGENCY COMMANDS

# Enable firewall immediately
sudo /usr/libexec/ApplicationFirewall/socketfilterfw --setglobalstate on

# Quick network check
ping -c 2 8.8.8.8

# Check current WiFi
networksetup -getairportnetwork en0

πŸ“‹ FIELD CHECKLIST

Before Connecting

  • Network name matches expected?
  • Any duplicate network names?
  • Run quick test first

After Test Results

  • All tests passed?
  • Any threats detected?
  • Firewall enabled?
  • System secure?

πŸ”§ COMMON FIXES

# Enable firewall + stealth mode
sudo /usr/libexec/ApplicationFirewall/socketfilterfw --setglobalstate on
sudo /usr/libexec/ApplicationFirewall/socketfilterfw --setstealthmode on

# Flush DNS cache
dscacheutil -flushcache

# Check exposed services
netstat -an | grep LISTEN

πŸ“ž ESCALATION

If Pineapple Detected

  1. Disconnect WiFi
  2. Document findings
  3. Notify security team
  4. Switch to VPN/cellular

If System Compromised

  1. Enable firewall
  2. Secure exposed services
  3. Full security audit
  4. Monitor for intrusion

πŸ“± Keep this handy when using untrusted WiFi!