Welcome to hacking a rise in this one we are going to show you wifiphisher a python script that will help you gain WiFi passwords social media passwords stuff like that

what is wifiphisher

Wifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing. Using Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing targeted Wi-Fi association attacks. Wifiphisher can be further used to mount victim-customized web phishing attacks against the connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the victim stations with malwares.

Wifiphisher is…

…powerful. Wifiphisher can run for hours inside a Raspberry Pi device executing all modern Wi-Fi association techniques (including “Evil Twin”, “KARMA” and “Known Beacons”).

…flexible. Supports dozens of arguments and comes with a set of community-driven phishing templates for different deployment scenarios.

…modular. Users can write simple or complicated modules in Python to expand the functionality of the tool or create custom phishing scenarios in order to conduct specific target-oriented attacks.

…easy to use. Advanced users can utilize the rich set of features that Wifiphisher offers but beginners may start out as simply as “./bin/wifiphisher”. The interactive Textual User Interface guides the tester through the build process of the attack.

…the result of an extensive research. Attacks like “Known Beacons” and “Lure10” as well as state-of-the-art phishing techniques, were disclosed by our developers, and Wifiphisher was the first tool to incorporate them.

…supported by an awesome community of developers and users.

…free. Wifiphisher is available for free download, and also comes with full source code that you may study, change, or distribute under the terms of the GPLv3 license.

how wifiphisher works

Wi-Fi phishing consists of two steps:

The first step involves the process of associating with Wi-Fi clients unknowingly, or in other words, obtaining a man-in-the-middle (MITM) position. Wifiphisher uses a number of different techniques to achieve this including:

Evil Twin, where Wifiphisher creates a fake wireless network that looks similar to a legitimate network.
KARMA, where Wifiphisher masquerades as a public network searched for by nearby Wi-Fi clients.
Known Beacons, where Wifiphisher broadcasts a dictionary of common ESSIDs, that the around wireless stations have likely connected to in the past.
At the same time, Wifiphisher keeps forging “Deauthenticate” or “Disassociate” packets to disrupt existing associations and eventually lure victims using the above techniques.

Performing MiTM attack

(Optionally) There are a number of different attacks that can be carried out once Wifiphisher grants the penetration tester with a man-in-the-middle position. For example, the tester may perform data sniffing or scan the victim stations for vulnerabilities.

Using Wifiphisher, advanced web phishing techniques are possible by gathering information from the target environment and victim user. For example, in one of our scenarios, Wifiphisher will extract information from the broadcasted beacon frames and the HTTP User-Agent header to display a web-based imitation of Windows network manager in order to capture the Pre-Shared Key.


How to install Wifiphisher

so there is two way to install this on kali type apt-get install wifiphisher -y
Wifiphisher 1

or use git hub
git clone https://github.com/wifiphisher/wifiphisher.git
cd wifiphisher # Switch to tool’s directory
sudo python setup.py install # Install any dependencies

How to use Wifiphisher

now its installed type wifiphisher -iI wlan1 it will gave you this screen just pick you target press enter
Wifiphisher 2

now u picked your target we are going to be asked what method you want to use to gain password
Wifiphisher 3

now we with for the target to type there password the script will close as soon as the password is gained
Wifiphisher 4

Leave a Reply