Sponsored
Ethical Hacking

WifiPhisher – A WPA Exploiting Tool

Hey folks, in this video we are going to talk about on wireless phishing attack using the Github tool. There is multiple method to crack the password of WPA/WPA2 but if the brute force method fails so there is one method left called phishing.

WifiPhisher – A WPA/WPA2 Exploiting Tool

WifiPhisher is WI-FI exploiting tool which is used to perform the phishing attack against the WI-FI clients to grab the credentials and infected them by using the malware. Attacker can take the position of man-in-the-middle (MITM) by using WifiPhishing.

How Does it Work ?

WifiPhisher send the infinite packet to De-authenticate all the traffic or wifi device and in between it create a fake DHCP ( Dynamic Host Configuration Protocol) server and broadcast the SSID which is similar to the realistic SSID. Hence when victim try to connect the internet then the wifiphisher served the fake page on the victim screen that ask for credentials and when victim fills his credentials on input form so they turn to the attacker.

Requirements

Kali Linux = Attacker
Window = Victim

Lets get start πŸ™‚ !!

Start your kali machine and navigate the terminal on desktop. After to do this you have to clone the script from Github by using the following command.

git clone https://github.com/wifiphisher/wifiphisher.git

After the cloning a new directory will be automatically created on that place. Now we need to go on that directory.

cd wifiphisher

Check the file using the list command.

ls

Now execute the following command to complete the requirements of wifiphisher tool.

python3 setup.py install

Once the setup is complete you can start the wifiphisher tool by using this command.

wifiphisher

Note : You should have wireless adapter to fetch the networks otherwise you cannot perform wireless attack.

It will fetch all network through the wireless adapter which is available nearby and will introduce you.

After select the target it will provide four option from which you have to select the option fourth.

When you will select the option then the all wifi clients will be disconnected from their network and when they will try to access again a firmware update page will be open on display which will ask for credentials.

As soon as they will enter his WPA/WPA2 key on input form so they comes to the attacker.

Network Manager Connect

There is no much difference between both method but in this method you will get some realistic because it will provide realistic phishing page as we normally see on window 10 machine.

Again select your target and go further process.

Now select the network manager connect option and go to next step.

When victim will disconnect from their network like above process then phishing page will ask their credentials to reconnect from network.

After execute the whole process the credentials will be comes to the attacker.

0Auth Login Page

You can get the credentials of facebook account by using this option.

Click on auth login option as shown below.

Here you can see that as soon as we execute this option victim will automatically redirect on this page.

After submit the credentials of facebook login by victim they comes to the attacker.

Great πŸ™‚ !!

About the Author
Shubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin.
Sponsored

Recent Posts

Termux Cheat Sheet for Hackers

Hey Folks :) !! In this article, we present the "Termux Cheat Sheet for Hackers"…

1 month ago

Cracking the X-Factor in Cybersecurity: How Humans are Protecting the Systems?

Amid the rapid advancement of technology, the significance of human involvement in cybersecurity frequently goes…

8 months ago

Cariddi – Hidden Endpoint Finder for Bug Hunting

Hey Folks, we are back today after such a long break, but don't worry we…

2 years ago

API Security Testing 101: Know Everything About API Security Testing!

The security of your API should be one of the top priorities of companies. Without…

2 years ago

7 Best Tools for Web Penetration Testing: Comprehensive Details

Hey Folks, In today's business world, it is essential to have an online presence. However,…

2 years ago

Cyber Security Audits: Everything You Need to Know About It

Hey Folks, Is your business prepared in case of a cyber attack? Many companies don't…

2 years ago
Sponsored

This website uses cookies.