Atlantis 143 [hide]Step 1 : Make Sure You Have Everything To prepare our evil twin access point attack, we'll need to be using Kali Linux or another supported distro. Quite a few distributions are supported, and you can check out the Airgeddon GitHub page for more about which Airgeddon will work with. You can use a Raspberry Pi running Kali Linux for this with a wireless network adapter, Finally, you'll need a good wireless network adapter for this. In our tests, I found that the TP-Link WN722N v1 and Panda Wireless PAU07 cards performed well with these attacks. You can find more information On Google [ Search for best EXT Wifi Adapter for Hacking]. Step 2 - Install Airgeddon To start using the Airgeddon wireless attack framework, we'll need to download Airgeddon and any needed programs. The developer also recommends downloading and installing a tool called CCZE to make the output easier to understand. You can do so by typing apt-get install ccze a terminal window. Next, we'll install Airgeddon, change directories, and start Airgeddon with the following commands. git clone https://github.com/v1s1t0r1sh3r3/airgeddon cd airgeddon sudo bash ./airgeddon.sh If you see the alien spaceship, you know you're ready to hack. Step 3 - Configure Airgeddon Press enter to check the various tools the Airgeddon framework relies on. If you're missing any, you can open a new terminal window and type apt-get install tool, substituting "tool" for the name of the missing tool. If that doesn't work, you can also try sudo pip install tool. When you have all of the tools, proceed to the next step by pressing return. Otherwise, you may experience problems during your attack, especially if you are missing dnsspoof. Next, the script will check for internet access so it can update itself if a newer version exists. When this is done, press enter to select the network adapter to use. After we select our wireless network adapter, we'll proceed to the main attack menu. Press 2 to put your wireless card into monitor mode. Next, select option 7 for the "Evil Twin attacks" menu, and you'll see the submenu for this attack module appear. Step 4 - Select Target Now that we're in our attack module, select option 9 for the "Evil Twin AP attack with a captive portal." We'll need to explore for targets, so press enter, and you'll see a window appear that shows a list of all detected networks. You'll need to wait for a little to populate a list of all the nearby networks. Step 5 -Gather the Handshake Now, we'll select the type of de-authentication attack we want to use to kick the user off their trusted network. I recommend the second option, "Deauth aireplay attack," but different attacks will work better depending on the network. Press enter once you've made your selection, and you'll be asked if you'd like to enable DoS pursuit mode, which allows you to follow the AP if it moves to another channel. You can select yes (Y) or no (N) depending on your preference, and then press enter. Finally, you'll select N for using an interface with internet access. We won't need to for this attack, and it will make our attack more portable to not need an internet source. Next, it will ask you if you want to spoof your MAC address during this attack. In this case, I chose N for "no." Now, if we don't already have a handshake for this network, we'll have to capture one now. Be VERY careful not to accidentally select Y for "Do you already have a captured Handshake file?" if you do not actually have a handshake. There is no clear way to go back in the script without restarting if you make this mistake. Since we don't yet have a handshake, type N for no, and press enter to begin capturing. Once the capture process has started, a window with red text sending deauth packets and a window with white text listening for handshakes will open. You'll need to wait until you see "WPA Handshake:" and then the BSSID address of your targeted network. In the example below, we're still waiting for a handshake. Once you see that you've got the handshake, you can exit out of the Capturing Handshakewindow. When the script asks you if you got the handshake, select Y, and save the handshake file. Next, select the location for you to write the stolen password to, and you're ready to go to the final step of configuring the phishing page. Step 6 - Set the Phishing Page In the last step before launching the attack, we'll set the language of the phishing page. The page provided by Airgeddon is pretty decent for testing out this style of attack. In this example, we'll select 1 for English. When you've made your selection, press enter, and the attack will begin with six windows opening to perform various functions of the attack simultaneously. Step 7 - Capture Network Credentials With the attack underway, the victim should be kicked off of their network and see our fake one as the only seemingly familiar option. Be patient, and pay attention to the network status in the top right window. This will tell you when a device joins the network, allowing you to see any password attempts they make when they're routed to the captive portal. When the victim joins your network, you'll see a flurry of activity like in the picture below. In the top-right corner, you'll be able to see any failed password attempts, which are checked against the handshake we gathered. This will continue until the victim inputs the correct password, and all of their internet requests (seen in the green text box) will fail until they do so. When the victim caves and finally enters the correct password, the windows will close except for the top-right window. The fake network will vanish, and the victim will be free to connect back to their trusted wireless network. The credentials should be displayed in the top-right screen, and you should copy and paste the password into a file to save, in case the script doesn't save the file correctly. This sometimes happens, so make sure not to forget this step or you might lose the password you just captured. After this, you can close the window, and close down the tool by pressing Ctrl + C. If we get a valid credential in this step, then our attack has worked, and we've got the Wi-Fi password by tricking the user into submitting it to our fake AP's phishing page![/hide] I appreciate a like! Leechers will get reported and banned! 1 Quote Share this post Link to post Share on other sites
laikosd 0 I appreciate a like! Leechers will get reported and banned! :fiesta: :fiesta: looool mrc Quote Share this post Link to post Share on other sites
Zoohaus 21 How does it work with WiFi adapter and Kali Linux on VM? Quote Share this post Link to post Share on other sites
Atlantis 143 How does it work with WiFi adapter and Kali Linux on VM? If I'm honest I have no Idea, but you can try it Quote Share this post Link to post Share on other sites
PandaTrEx 0 I appreciate a like! Leechers will get reported and banned! Hope its working if not report Quote Share this post Link to post Share on other sites
pbarrebenta 2 Does it really works? do you have proof? Quote Share this post Link to post Share on other sites
click_bate 1 i really hope its not kali linux Quote Share this post Link to post Share on other sites
bomnop 0 thanks friend I always give you I like your posts are at% 100 Quote Share this post Link to post Share on other sites
Hennyhardaway 1 Thank you for this... always wanted to try Quote Share this post Link to post Share on other sites
Alcagoitas 0 I appreciate a like! Leechers will get reported and banned! thaaaaaaaaaaaaannnnnnnnnnnnnnnkkkkkkkkkkkkssssssssss Quote Share this post Link to post Share on other sites
1qaypnl 3 nice bro. i will see if this work for me . thx bro Quote Share this post Link to post Share on other sites