Wifi Pisher
Wifi Pisher
Wifi Pisher
Wifiphisher is a rogue Access Point framework for conducting red team engagements or
Wi-Fi security testing. Using Wifiphisher, penetration testers can easily achieve a
man-in-the-middle position against wireless clients by performing targeted Wi-Fi
association attacks. Wifiphisher can be further used to mount victim-customized web
phishing attacks against the connected clients in order to capture credentials (e.g.
from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the victim
stations with malwares.
Wifiphisher is...
...powerful. Wifiphisher can run for hours inside a Raspberry Pi device executing
all modern Wi-Fi association techniques (including "Evil Twin", "KARMA" and "Known
Beacons").
...modular. Users can write simple or complicated modules in Python to expand the
functionality of the tool or create custom phishing scenarios in order to conduct
specific target-oriented attacks.
...easy to use. Advanced users can utilize the rich set of features that Wifiphisher
offers but beginners may start out as simply as "./bin/wifiphisher". The interactive
Textual User Interface guides the tester through the build process of the attack.
...the result of an extensive research. Attacks like "Known Beacons" and "Lure10" as
well as state-of-the-art phishing techniques, were disclosed by our developers, and
Wifiphisher was the first tool to incorporate them.
...free. Wifiphisher is available for free download, and also comes with full source
code that you may study, change, or distribute under the terms of the GPLv3 license.
How it works
Wi-Fi phishing consists of two steps:
The first step involves the process of associating with Wi-Fi clients unknowingly,
or in other words, obtaining a man-in-the-middle (MITM) position. Wifiphisher uses a
number of different techniques to achieve this including:
Evil Twin, where Wifiphisher creates a fake wireless network that looks similar to a
legitimate network.
KARMA, where Wifiphisher masquerades as a public network searched for by nearby
Wi-Fi clients.
Known Beacons, where Wifiphisher broadcasts a dictionary of common ESSIDs, that the
around wireless stations have likely connected to in the past.
At the same time, Wifiphisher keeps forging “Deauthenticate” or “Disassociate”
packets to disrupt existing associations and eventually lure victims using the above
techniques.
(Optionally) There are a number of different attacks that can be carried out once
Wifiphisher grants the penetration tester with a man-in-the-middle position. For
example, the tester may perform data sniffing or scan the victim stations for
vulnerabilities.
Requirements
Following are the requirements for getting the most out of Wifiphisher:
A working Linux system. People have made Wifiphisher work on many distros, but Kali
Linux is the officially supported distribution, thus all new features are primarily
tested on this platform.
One wireless network adapter that supports AP & Monitor mode and is capable of
injection. Drivers should support netlink.
Installation
To install the latest development version type the following commands:
Usage
Run the tool by typing wifiphisher or python bin/wifiphisher (from inside the tool's
directory).
By running the tool without any options, it will find the right interfaces and
interactively ask the user to pick the ESSID of the target network (out of a list
with all the ESSIDs in the around area) as well as a phishing scenario to perform.
By default, the tool will perform both Evil Twin and KARMA attacks.
Useful for manually selecting the wireless adapters. The "Firmware Upgrade" scenario
is an easy way for obtaining the PSK from a password-protected network.
Useful against networks with disclosed PSKs (e.g. in conferences). The "Plugin
Update" scenario provides an easy way for getting the victims to download malicious
executables (e.g. malwares containing a reverse shell payload).
Useful against victims in public areas. The "OAuth Login" scenario provides a simple
way for capturing credentials from social networks, like Facebook.
Following are all the options along with their descriptions (also available with
wifiphisher -h):