Evil AP
Evil AP
P R I V A C Y ,
O N
S E C U R I T Y ,
T E C H N O L O G Y ,
C U L T U R E
A N D
SLEUTH BLOG
Sleuth Blog
M O R E
P O P
I had some time recently to experiment further with some tools in Kali Linux which I hadn't
previously used. In this instalment I run through using Wifi Honey to create a fake Wireless AP
which can have endless uses but ultimately it can be used to try crack the passcode of a Wireless
AP by getting a device to repeatedly try to authenticate against your fake AP.
If you need to learn how to use wifite you can learn how to do it in in an earlier post
available here. So to get started run wifite and follow the prompts to create a monitor interface
(mon0):
$ wifite
Now to run Wifi Honey run the following command in a separate window to wifite:
Default channel is 1
Now sit back and wait as Wifi Honey collects the inputs which will all be stored as .cap files.
I tried to connect to the fake AP with an Android Phone (Samsung Galaxy S3) Heres what it
looked like when connecting from the Android Phone:
Trying to connect.
Once you have collected all of the Raw files you can run through them with a program like
aircrack-ng to attempt to recover the real AP password.
Conclusion
As always please let me know if found this article useful or if you didn't, Dont forget to like this
post or leave a comment below to let me know another area you would be interested in reading
about. Thanks for your continued support!