An Automated Tool To Hack Wi-FiPasswords : WiFi Phisher – Technosensation is back again with one more really awesome article about how you can hack WiFii Passwords.
GitHub, a web based Git repository hosting services, has a new tool for fast, automated phishing attacks against WPA networks.
The new tool, Wifiphiser, attacks WPA networks based on social engineering without using any brute-forcing.
The tool attacks the WPA networks in three phases: by de-authenticating the victim from his/her access point; re-authenticating it back to a rogue, malicious access point; and finally connecting to a realistic router config-looking page to steal the victim’s credentials.
The working details on the website read as follows: “Wifiphisher continuously jams all of the target access point’s wifi devices within range by sending de-auth packets to the client from the access point, to the access point from the client, and to the broadcast address as well.”
“Wifiphisher sniffs the area and copies the target access point’s settings. It then creates a rogue wireless access point that is modeled on the target. It also sets up a NAT/DHCP server and forwards the right ports. Consequently, because of the jamming, clients will start connecting to the rogue access point. After this phase, the victim is MiTMed.”
“wifiphisher employs a minimal web server that responds to HTTP & HTTPS requests. As soon as the victim requests a page from the Internet, wifiphisher will respond with a realistic fake page that asks for WPA password confirmation due to a router firmware upgrade.”
The tool works on Kali Linux and has the MIT license. The authors, who credit Dan McInerney for ideas on the tool, have sought help of developers through the website to improvise it.
“If you are a Python developer or a web designer you can help us improve wifiphisher. Feel free to take a look at the bug tracker for some tasks to do.” Source of this article is HackRead. Thanks to them for providing such an awesome article.