WireSpy For Man in middle attack
WireSpy allows attackers to set up quick honeypots to carry out MITMAs. Monitoring and logging functionality is implemented in order to keep records of the victims' traffic/activities. Other tools can be used together with Wirespy to conduct more advanced attacks.
Features
- Capture victims' traffic.
- MAC address spoofing.
- Set-up honeypot and evil twin attacks.
- Show the list of in range access points.
- Wireless adapter|card|dongle power amplification.
Usage
Set as executable:
git clone https://github.com/aress31/wirespy
chmod +x wirespy.sh
Execute as root:
sudo ./wirespy.sh
Type help to get started.
Attacks:
eviltwin > launch an evil twin attack
honeypot > launch a rogue access point attack
Commands:
clear > clear the terminal
help > list available commands
quit|exit > exit the program
apscan > show all wireless access points nearby
leases > display DHCP leases
powerup > power wireless interface up (may cause issues)
start capture > start packet capture (tcpdump)
stop capture > stop packet capture (tcpdump)
status > show modules
Two type of attacks are supported at the moment:
Evil twin: Force victims to auto-connect to the honeypot by spoofing a "trusted" hotspot (clone an existing access point and de-authenticate its users to force them to transparently connect to the spoofed honeypot).
Honeypot: Set up a simple rogue hotspot and wait for clients to connect.
No comments:
Post a Comment