Most devices remember the password that is used to authenticate to the SSID.
I’m looking into the possibility of creating a fake router with the same SSID that logs the password that devices use when attempting to connect. I will be like stealing candy from a baby
How can I create router that steals passwords via the described vector?
You have very little understanding of how these things work. Fix that first.
Go and check out aircrack-ng. Their wiki is pretty good as a place to start if you're interested in this sort of thing. I ran a few proof of concept attacks with my own hardware, had less success with the neighbours' stuff. It's not actually as fun as it sounds, to be honest, but then I get bored easily so YMMV.
>>54821977
https://www.wifipineapple.com
>>54821977
tfw
>>54821977
> mfw: connecting to the SSID
>>54821977
WiFi Pineapple or use a evil twin or that new tool called fluxion search for it on github
how can i google??
kill yourself faggot
>>54821977
A few problems...
>SSID alone won't create the confusion between networks you're looking for. All wireless devices have unique IDs called MAC addresses. Routers, or access points (APs), have BSSIDs, which is just their MAC address. Devices connect to routers by MAC address, not SSID, specifically to avoid such easy spoofing.
>You could spoof a MAC address, but I'm not sure how to do that for an access point.
>Even if the device does connect to your router over the other, and sends you the stored password, the incoming information will be encrypted. WPA2 uses handshakes so that the client knows how to encrypt data in a way that the server can decode it, all while not sending the decode key over the air.
>I will be like stealing candy from a baby
Stop being a faggot.