Home

Awesome

WPA2-Enterprise: Rogue APs

Through these scripts it is possible to create Rogue or Fake Access Points and carry out an authentication downgrade attack against WPA and WPA2-Enterprise networks, obtaining passwords in hash format or cleartext (if GTC downgrade is successful).

Both the installation scripts, ISO files and virtual machines (in VMWare and VirtualBox format) are included.

<br>

ISO files and Virtual machines download

Operating systemPlatformCredentialsSizeLink
Ubuntu 16.04.5VMwarericardojoserf:wifi3.25 GBMEGA
Kali 2019.1VMwareroot:wifi4.99 GBMEGA
Ubuntu 16.04.5VirtualBox (OVA)ricardojoserf:wifi3.18 GBMEGA
Kali 2019.1VirtualBox (OVA)root:wifi5.56 GBMEGA
<br>

Hostapd & Freeradius-wpe

Start the Access Point using:

sh freeradius_wpe_init.sh $AP_NAME $INTERFACE

Or if you are using the virtual machine:

freeradiuswpe $AP_NAME $INTERFACE

Screenshot

When a client connects, read logs with:

sh freeradius_wpe_read.sh

Or if you are using the virtual machine:

readlog

Screenshot

Result:

Screenshot

<br>

Hostapd-wpe

Start the Access Point using:

sh hostapd_wpe_init.sh $AP_NAME $INTERFACE

Or if you are using the virtual machine:

start_wpe $AP_NAME $INTERFACE

Screenshot

<br>

Installation

In case you do not want to use the virtual machine, you can install everything using:

sh install.sh