WiFi Pineapple is archaic and uses python2. What you are looking for is very much doable, and there are tons of different ways to go about it. If I were to hypothetically write a book about someone gaining access to a device
Arp cache poisoning:
The best method would be to poison the ARP cache, performing a MiTM (man in the middle) attack combined with DNS poisoning. This way when the user types ie google.com, you respond with your own website. The user will see google.com on their machine, but a website your are hosting yourself. Then the next step is to gain a foothold︀ by directing the user to a website he is likely to visit and download something︁ from. You can see which website a user visits but not the data cause it's︂ encrypted.
You pick some nice malware for user to download, and at that point you︃ will have full control over everything.
This is just one method and pretty easy, you︄ can also scan the ports of the user device and see if a vulnerable service︅ is running there to gain a foothold. Or maybe an old Windows version etc.
Dns poisoning is basically how the China firewall works. They make sure only approved websites can︆ be viewed within China.
I would also NEVER use a Chinese made device nor download︇ Chinese software / apps on the device since a lot of them are backdoor-ed. Just︈ today a major Chinese e-commerce app turned out to be backdoored. US-made device have backdoors︉ too but there is a lot more backlash from the public in the US about︊ privacy invasion. Apple for example is quite serious about privacy (not really) in PR, and︋ the way Musk is anti-government would lead to immediate incarceration in China.
I personally use︌ Huawei laptops though, it depends on your threat-model. I would also use Huawei phone but︍ not for crypto. I would NEVER use a Chinese router, routers are extremely dangerous if︎ invaded by an advanced attacker for the reasons above. You can play for almost god.️
The same DNS spoofing method can be done far higher up the hierarchy and exploited in a maddening amount of ways. If you live in a nation that does not have strong controls on their secret service you must assume they can gain access to your devices whenever they want if the costs warrant it. This used to be a small problem only, cause many countries had poorly trained secret service, but these days any idiot can buy top-notch nation-state-grade tools from for example Israeli firms.
Examples:
1.
Fog Reveal - Wikipedia
2.
The UK Government Knows How Extreme The Online Safety Bill Is
3.
EFF Urges Appeals Court to Re-hear Case over Trump’s X Account
4.
Proposed UN Cybercrime︀ Treaty Threatens to be an Expansive Global Surveillance Pact - THIS IS UN LEVEL SURVEILLANCE︁
: Despite repeated civil society objections, the
zero draft of the Convention is looking less︂ like a cybercrime treaty and more like an expansive global surveillance pact.
China Examples:
1.
https://grizzlyreports.com/we-belie...nt-security-threat-to-u-s-national-interests/
2.
China Used a Tiny Chip in a Hack That Infiltrated U.S. Companies
3.
https://www.cnn.com/2023/04/02/tech...re-cybersecurity-analysis-intl-hnk/index.html
4.
Chinese hackers exploited years-old software flaws to break into telecom giants
https://www.bloomberg.com/quote/16667Z:US
Also never forget the US stopped tax evasion in Switzerland from US persons by basically planting︃ malware in the entire internet infrastructure of Europe to uncover the names of Americans with︄ accounts.
The United States Government's Pursuit of Swiss Banks who Assist American Tax Evaders
MAC address is incredibly easily spoofed, and actually exactly how handshake capture︊ attack occurs.
There is Routersploit, easiest way to get started it︌ to get a router and install OpenWRT, Pineapple is basically this. But you need to︍ be a technical person to perform an attack, Pineapple is a fun tool but more︎ for the hobbyist.
Current Windows is still exploitable through bootloader attack ie. BlackLotus. Windows and Linux are not safe operating system, best is to use Qubes OS on a Chinese-made laptop imo. Depending on threat model of course.
This is true, long password is hard to crack. New model of router + good password will keep most people out.