If you can trick user into entering a password into a fake login page, it doesn't matter how strong the password is. This is the opposite of cracking attacks, where you're using the computer's processing power to try a giant list of passwords incredibly quickly.
Wifiphisher can be further used to mount victim-customized web phishing attacks against the connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the victim stations with malwares.
How does it work?
The process of associating with Wi-Fi clients unknowingly, or in other words, obtaining a man-in-the-middle (MITM) position. Wifiphisher uses a number of different techniques to achieve this including:
- Evil Twin, where Wifiphisher creates a fake wireless network that looks similar to a legitimate network.
- KARMA, where Wifiphisher masquerades as a public network searched for by nearby Wi-Fi clients.
- Known Beacons, where Wifiphisher broadcasts a dictionary of common ESSIDs, that the around wireless stations have likely connected to in the past.
For this attack, you'll need an Adapters with monitor mode supported. You can see more here
select one that supports monitor mode.
Now, install wifiphisher: apt-get install wifiphisher
or get it from github:
git clone https://github.com/wifiphisher/wifiphisher.git
cd wifiphisher
sudo python setup.py install
wifiphisher -h to get help and wifiphisher's flags. You also can change by adding various flags to the command.
Now, time to phishing. Make sure that you putted your wireless adapter card.
To start the script: sudo wifiphisher
or sudo wifiphisher -i wlan0mon #wlan0mon is your wireless adapter card which in monitor mode
Then, just select which network you want to attack and press enter.
Next, choose the attack scenarios that you want to phishing.
After selecting the attack, it will immediately launch. A page will open to monitor for targets joining the network that Wifiphisher listening. Then it will create a fake network version to lure those devices into connecting.
At the same time, Wifiphisher keeps forging "Deauthenticate" or "Disassociate" packets to disrupt existing associations.
That's it! The script will exit and present you with the password you just captured! And users still stuck with fake loading screen.
Some scenarios: Fake OAuth Login Page, Fake web-based network manager
Thanks all