Awesome
WPA2-Enterprise: Rogue APs
Through these scripts it is possible to create Rogue or Fake Access Points and carry out an authentication downgrade attack against WPA and WPA2-Enterprise networks, obtaining passwords in hash format or cleartext (if GTC downgrade is successful).
Both the installation scripts, ISO files and virtual machines (in VMWare and VirtualBox format) are included.
<br>ISO files and Virtual machines download
Operating system | Platform | Credentials | Size | Link |
---|---|---|---|---|
Ubuntu 16.04.5 | VMware | ricardojoserf:wifi | 3.25 GB | MEGA |
Kali 2019.1 | VMware | root:wifi | 4.99 GB | MEGA |
Ubuntu 16.04.5 | VirtualBox (OVA) | ricardojoserf:wifi | 3.18 GB | MEGA |
Kali 2019.1 | VirtualBox (OVA) | root:wifi | 5.56 GB | MEGA |
Hostapd & Freeradius-wpe
Start the Access Point using:
sh freeradius_wpe_init.sh $AP_NAME $INTERFACE
Or if you are using the virtual machine:
freeradiuswpe $AP_NAME $INTERFACE
When a client connects, read logs with:
sh freeradius_wpe_read.sh
Or if you are using the virtual machine:
readlog
Result:
<br>Hostapd-wpe
Start the Access Point using:
sh hostapd_wpe_init.sh $AP_NAME $INTERFACE
Or if you are using the virtual machine:
start_wpe $AP_NAME $INTERFACE
<br>
Installation
In case you do not want to use the virtual machine, you can install everything using:
sh install.sh