Jump to content

WPA2 phishing - super EASY (Evil Twin)


Recommended Posts

Hi.

This is a personal tutorial on how to hack an access point (modem) protected by WPA2

Using kali linux or any unix system with the appropriate software installed. Please use this on networks you are authorized to penetrate

Enjoy !
 

Spoiler

1. Check that your network device supports monitor mode and injection mode ; on linux the command lspci can help to know what is your network device.

2. type iwconfig
It will show the network interfaces, your wireless interface is probably called "wlan0". It will be shown in managed mode.

3. type the command : airodump-ng wlan0 (or whatever your wireless interface is)
please not that after this command, you will not be connected to the internet, because your network adapter will switch to monitor mode.
Don't worry, I'll show you at the end how to put things back to normal.

So, the command will show you all the access points detected by your device, and below, the connected devices to these points.

Choose the access point you want, you have to note the mac address and the channel somewhere. 


4. type : aireplay-ng --deauth 1000 -a ModemMacAddress -c DeviceMacAddress wlan0
the modem Mac address is the one that appeared on the top of the previous command
the device Mac address is the address of a device (printer, phone, whatever) connected to the target modem. Typically it will be shown in the second table printed by the command of part 3.

The goal is to make the device disconnecting from its modem. So your target won't be able to access to internet through his device, temporarily...

5. Let's create a fake access point with the same name than your target.
Then your target will see two access points of the same name. But as the first one is not working (thx to 4.), he will probably click on the second point, the fake one.
Then you'll be able to make him type his WPA2 key.

apt-get install mana-toolkit

with this command, check that the interface name (wlan0 by default) matches your adapter interface name. Change also the SSID name to match with your target.
cat /etc/mana-toolkit/hostapd-mana.conf
cat /usr/share/mana-toolkit/run-mana/start-nat-simple.sh

Then start the second script (start-nat-simple.sh). It is done ! Your target will hopefully connect to your fake network and you'll be able to get his packets information.


Here are some useful articles :
To see the link, you must have 50+ comments (Rank User+) if you do not have you will need a subscription +Client, Gold or VIP! The link is currently hidden from you. Request a subscription from this link : --> https://forum.softinfo.org/subscriptions/
To see the link, you must have 50+ comments (Rank User+) if you do not have you will need a subscription +Client, Gold or VIP! The link is currently hidden from you. Request a subscription from this link : --> https://forum.softinfo.org/subscriptions/

Don't hesitate to ask questions if you have.

 

Link to comment
Share on other sites

Преди 20 часа, Uploader написа:

Hi.

This is a personal tutorial on how to hack an access point (modem) protected by WPA2

Using kali linux or any unix system with the appropriate software installed. Please use this on networks you are authorized to penetrate

Enjoy !
 

To see the link, you must have 50+ comments (Rank User+) if you do not have you will need a subscription +Client, Gold or VIP! The link is currently hidden from you. Request a subscription from this link : --> https://forum.softinfo.org/subscriptions/ Скрий съдържанието

1. Check that your network device supports monitor mode and injection mode ; on linux the command lspci can help to know what is your network device.

2. type iwconfig
It will show the network interfaces, your wireless interface is probably called "wlan0". It will be shown in managed mode.

3. type the command : airodump-ng wlan0 (or whatever your wireless interface is)
please not that after this command, you will not be connected to the internet, because your network adapter will switch to monitor mode.
Don't worry, I'll show you at the end how to put things back to normal.

So, the command will show you all the access points detected by your device, and below, the connected devices to these points.

Choose the access point you want, you have to note the mac address and the channel somewhere. 


4. type : aireplay-ng --deauth 1000 -a ModemMacAddress -c DeviceMacAddress wlan0
the modem Mac address is the one that appeared on the top of the previous command
the device Mac address is the address of a device (printer, phone, whatever) connected to the target modem. Typically it will be shown in the second table printed by the command of part 3.

The goal is to make the device disconnecting from its modem. So your target won't be able to access to internet through his device, temporarily...

5. Let's create a fake access point with the same name than your target.
Then your target will see two access points of the same name. But as the first one is not working (thx to 4.), he will probably click on the second point, the fake one.
Then you'll be able to make him type his WPA2 key.

apt-get install mana-toolkit

with this command, check that the interface name (wlan0 by default) matches your adapter interface name. Change also the SSID name to match with your target.
cat /etc/mana-toolkit/hostapd-mana.conf
cat /usr/share/mana-toolkit/run-mana/start-nat-simple.sh

Then start the second script (start-nat-simple.sh). It is done ! Your target will hopefully connect to your fake network and you'll be able to get his packets information.


Here are some useful articles :

Hidden Content

  • Give reaction to this post to see the hidden content.

 

Hidden Content

  • Give reaction to this post to see the hidden content.

 

 

Don't hesitate to ask questions if you have.

 

?

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
 Share

×
×
  • Create New...