Skip to content

wshen0123/mitm-rogue-WiFi-AP

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

mitm_rogue_wifi_ap

MITM Attack Example Code with Rogue Wi-Fi AP

This is actually a blundle of tools and codes for Rogue Wi-Fi AP MITM Attack demonstration.

NOTICE The startAP and stopAP script will over-write any iptables setting. Back them up ahead! Sniffing and attacking network without permission is illegal. Think twice before your conduct.

Tools used

  • ifconfig: Wi-Fi card setup and IP configuration

  • iptables: detour target packets to libnetfilter_queue

  • hostapd: soft AP control program

  • dhcpd: dhcp server tool to create a private network within AP

  • libnetfilter_queue: (or NQUEUE), do actual packet detour, exam and mangle

files

  • startAP: setup Wi-Fi card(hostapd), private network(hostapd), packet detour(iptables)

  • libnetfilter.c compile this file and run after ./startAP. This file will handle all packets through NQUEUE as you programmed.

  • change_ttl.py python version of NQUEUE mangling(sorry I don't remember the sourse/author of this script)

  • stopAP: kill the AP and clean up necesary settings.

  • dhcpd.conf dhcpd configuraton file, used by startAP

  • hostapd.conf hostapd configuraton file, used by startAP

About

MITM Attack Example Code with Rogue Wi-Fi AP

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published