Home

Awesome

apd_launchpad

Facilitate the creation of hostapd-wpe configuration files and spoofed certificates for WPA2 Enterprise credential harvesting.

Place apd_launchpad.py in your (functioning) hostapd-wpe directory. Running the script creates a new subdirectory named after the "TARGET" parameter and containing the associated configuration and certificate files which can be removed following the assessment.

hostapd-wpe related arguments:

-s SSID, --ssid SSID

SSID of wireless network. Required.

-i INTERFACE, --interface INTERFACE

Wireless interface on which to broadcast. Required.

-ch CHANNEL, --channel CHANNEL

Channel on which to broadcast (default "1").

-bc {0,1,2}, --broadcast {0,1,2}

Broadcast or cloak the SSID. 0=Broadcast SSID; 1=Send empty SSID beacon (length=0); 2=Send SSID beacon with length (length=N) (default 0).

-br BRIDGE, --bridge BRIDGE

Bridge interface to use for MitM (default none).

-w {1,2}, --wpa {1,2}

Version of WPA (default "2")

Certificate generation options:

-cn COMMON_NAME, --common-name COMMON_NAME

Common name for certificate. Required.

-o ORG, --org ORG

Organization for certificate. Optional.

-st STATE, --state STATE

State or province for certificate. Optional.

-c COUNTRY, --country COUNTRY

Country code for certificate. Optional.

-p PASSWORD, --password PASSWORD

Password for certificate generation (default "password").

-l LOCATION, --location LOCATION

Location for certificate. Optional.

-ou ORG_UNIT, --org-unit ORG_UNIT

Organizatoinal unit for certificate. Optional.

-e EMAIL, --email EMAIL

Email address for cerificate. Optional.

-v, --verbose

Show verbose output.