Disclaimer. This tool is for informational and educational purposes only.
Tested in kali linux 2019.b
python 2.7
The main goal of the tool is to perform MITM attack. The "victims" can be any AP around (Wifi access point). Also the mission was besides attack also defence against this attack. This tool is mainly target open public wifi networks. Our victim will think he is fine and have full access to interenet but he doesn't he logged in malicious hotspot. From here, you can do alot of things - for example to add bitcoin miner to each request, find a way to make client download malicious script and get full access to his computer and so on..
The tool also supports deauth attack (more explained in repository WiFi-Deauthentication-attack-tool)
The attack following by few steps:
When the client is connected to us, we can sniff information and this is what we doing here, in this example we store gmail phishing site and when client attempt to connect gmail he will actually see the fake page and will enter his details.
We used few dependencies
- dnsmasq
- hostapd
- pyaccesspoint
- scapy
Few things we have to do before running:
- Make sure we have /etc/hosts file
- Locate gmail folder as it is
- Provide mysql db – user,db and table
Make sure you do have network adapter supports monitor mode. • Pyaccesspoint edited so make sure to replace it after installation (might work without full installation of pyaccesspoint, didn't check)
Launching the program –
We see three options –
- Deauth attack
- Evil Twin attack
- Evil Twin defend
In this case we choose 2 – Evil twin attack We will see all available networks around, we either can rescan or not.
Choosing our target, if you have two network cards the attack can perfom simultaneously – sending probe requests and raising access point.
After this we start attacking our target
Then we start to raise our AP, the tool will do this automatically
That’s all! Our fake AP is online and we ready for our clients. When client connects to our access point he manage to get full internet access, but when he will enter gmail (in our case) he will redirected to our phishing page. It will look like here –
Client will believe this is real login page of gmail so he will enter his account information
Finally, client will redirect to account manager of google
Going to our database we will see new details added
• I'm php expert therefore sensitive information about mysql connection may be exposed in php file.
The defence is basically based on knowledge that we know our mac addresses of our trusted access point. The stages –
The attack here is again, probe request flooding.
After we type 3 for entering the defent label, We have to enter which AP name we would like to defend
The tool now will start to scan for access points around
If evil twin found, we will attack the treat
SQL Table