Skip to content

syakesaba/hostapd-wpe

 
 

Repository files navigation

hostapd-wpe

Orig: https://github.com/aircrack-ng/aircrack-ng/tree/master/patches/wpe

How to use

Docker

git clone https://github.com/syakesaba/hostapd-wpe.git;
cd hostapd-wpe;
docker build . -t hostapd-wpe
docker run -ti --rm --privileged --net=host hostapd-wpe

Debian , Ubuntu

apt-get update;
apt-get install -y openssl libssl-dev libnl-3-dev libnl-genl-3-dev build-essential git wget libnfnetlink-dev libsqlite3-dev;
git clone https://github.com/syakesaba/hostapd-wpe.git;
cd hostapd-wpe;
wget https://w1.fi/releases/hostapd-2.6.tar.gz;
tar xzvf hostapd-2.6.tar.gz;
patch -p0 < hostapd-wpe-2.6-user.patch;
cd hostapd-2.6/hostapd;
make all;
cp hostapd-wpe ../../;
cd ../../certs;
./bootstrap;
cd ..;
cp ./confs/hostapd-wpe.conf .;
# assuming your wireless interface is 'wlan1'.
./hostapd-wpe hostapd-wpe.conf;
# enjoy!
# tail -f ./hostapd-wpe.log

Enjoy Dummy SSL Certificate

Generate

  1. Edit .cnf files in ./certs
  2. execute ./bootstrap in ./certs
  3. specify certificates created in hostapd's config file

Delete

  1. execute 'make destroycerts' in ./certs

Hostapd-wpe as RougeAP Spoofing

The syntax of a hostapd-wpe's configuration file is same as usual hostapd's one.
Let hostapd-wpe to use same ESSIDs Authentications and Encryptions of AP to spoof.
Edit and create your hostapd-wpe.conf .

Notes

  • don't delete eap_user "t", it's special user to keep bypassing TLS phase 1 anytime.
  • this wll offer ALL EAP Types to user "t" but if you don't want to restrict what EAP types to offer users.

Videos

Alt text for your video

About

Modified hostapd(https://w1.fi/hostapd/) to facilitate AP impersonation attacks

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Makefile 59.8%
  • Shell 40.2%