Update README.md

This commit is contained in:
tux 2025-09-11 11:23:46 +02:00
parent eb167b2201
commit cbb8ca29d6

View File

@ -4,49 +4,55 @@
This setup makes use of Hostapd-WPE (Wireless Pwnage Edition) which is a modified
version of the standard hostapd (Host Access Point Daemon) tool.
It enables setting up a rogue access point that mimics legitimate Wi-Fi networks,
tricking clients into connecting and capturing their authentication credentials.
It allows to set up a rogue access point which mimics legitimate Wi-Fi networks,
tricking clients into connecting with it and allows to capture their
authentication credentials which are sent within the clients connection attempt.
Modern wireless clients (laptops, smartphones, tablets) attempt to maintain
seamless connectivity by continuously probing for known Wi-Fi networks in their
saved list. This behavior allows them to automatically connect when a familiar
network is in range, without user intervention.
In combination with a tool like Hostapd-WPE this allows to make clients in range
connect, even if the authentication fails, and to monitor the attempted handshake.
saved list.
When a device is not connected to Wi-Fi, it will periodically send probe requests
asking if any of its previously connected networks are available.
This behavior allows them to automatically connect when a familiar network is in
range, without user intervention.
In combination with a tool like Hostapd-WPE this allows to cause clients in range
to connect and even when the authentication fails from the clients view, it still
allows to monitor the attempted handshake and obtain the contained authentication
credentials.
Hostapd-WPE can be configured to respond to all probe requests with an "available"
response, effectively making the client think the requested SSID is in range.
This works as hostapd-WPE can be configured to respond to all probe requests with
an "available" response, effectively making the client think the requested SSID
is in range.
Many clients, depending on their security settings, will automatically attempt
to connect to the AP, believing it to be the legitimate network.
The captured authentication attempts can then be used for offline password cracking.
As prerequisite the host which is used to run this setup needs two Wi-Fi network
cards.
Note: This method only works on clients which use a lower version than WPA3 as
encryption protocol, like WPA2 or WPA.
As prerequisite the host which is used to run the scripts needs two Wi-Fi network cards.
One is used to run Hostapd-WPE and needs to support AP mode.
The other is used to monitor the connection attempts and recording the authentication
The other is used to monitor the connection attempts and to record the authentication
handshakes, requiring monitor mode.
The supported modes for a Wi-Fi network card chipset can be checked with the
command "iw list".
The script "mon" is used to launch the monitoring mode with one of the network
cards, recording all captured connections in a pcap file which can then be used
for cracking the credentials.
The script "wpe" launches Hostapd-WPE in karma mode, making use of the client
behaviour explained above.
The script "mon" is used to launch the monitoring mode with one of the network
cards, recording all captured connections in a pcap file which can then be used
for extracting the credentials.
## Usage
The script **wpe** is used to start the imitating AP on one interface.
The interface needs to be set as option.
```sh
./wpe -i wlan0
sudo ./wpe -i wlan0
```
The script **mon** can then be started simultaniously while the wpe script is still running.
@ -54,7 +60,7 @@ It captures connection attempts and writes them to a capture file.
An interface needs to be given as option and it needs to be a different interface used for the wpe script.
```sh
./mon -i wlan1
sudo ./mon -i wlan1
```
Both scripts need the configuration file **hostapd-wpe.conf** either in the same directory or the default in /etc/hostapd-wpe/.
@ -64,8 +70,8 @@ Both scripts need the configuration file **hostapd-wpe.conf** either in the same
When monitoring Wi-Fi connections the resulting captured data is saved to a pcap
file, numbered by the times the tool was run, so for the first run "wpa-01.cap".
Various tools can be used to process the captured data, also making use of
various wordlists which, depending on the host system, are available in the
Various tools can be used to process the captured data, optionally making use of
various wordlists which, depending on the host system, available in the
directory /usr/share/wordlists.
Examples: