Wifiphisher - Get Anyone's Wi-Fi Password Without Cracking
Do you need to get a Wi-Fi password but don't have the time to crack it ? Here, we present to you an almost
surefire way to get a Wi-Fi password without cracking - Wifiphisher.
To sum up, Wifiphisher takes the following steps:
To do this hack, you will need Kali Linux and two network wireless adapters, one of which must be capable of packet injection. You can use the tried and true AWUS036NHA, or check out our guide on picking the best wireless network adapter for Kali Linux.
kali > tar -xvzf /root/wifiphisher-1.1.tar.gz
Alternatively, you can clone the code from GitHub by typing:
kali > git clone https://github/sophron/wifiphisher
kali > cd wifiphisher-.1.1
When listing the contents of that directory, you will see that the wifiphisher.py script is there.
kali > python wifiphisher.py
The first time you run the script, it will likely tell you that "hostapd" is not found and will prompt you to install it. Install by typing "y" for yes. It will then proceed to install hostapd.
When it has completed, once again, execute the Wifiphisher script.
When you hit Enter, Wifiphisher will display a screen like the one below that indicates the interface being used and the SSID of the AP being attacked and cloned.
The target user has been de-authenticated from their AP. When they re-authenticate, they will directed to the the cloned evil twin access point.
Steps in the Wifiphisher Strategy
The idea here is to create an evil twin AP,
then de-authenticate or DoS the user from their real AP. When they
re-authenticate to your fake AP with the same SSID, they will see a
legitimate-looking webpage that requests their password because of a
"firmware upgrade." When they provide their password, you capture it and
then allow them to use the evil twin as their AP, so they don't suspect
a thing. Brilliant!
To sum up, Wifiphisher takes the following steps:
- De-authenticate the user from their legitimate AP.
- Allow the user to authenticate to your evil twin.
- Offer a webpage to the user on a proxy that notifies them that a "firmware upgrade" has taken place, and that they need to authenticate again.
- The Wi-Fi password is passed to the hacker and the user continues to the web oblivious to what just happened.
Similar scripts have been around for awhile, such as Airsnarf,
but this new Wifiphisher script is more sophisticated. In addition, you
could always do this all manually, but now we have a script that
automates the entire process. Recently, another script named Fluxion has also gained popularity as an alternative to Wifiphisher. You can check out this great guide on Fluxion if Wifiphisher isn't working for you.
To do this hack, you will need Kali Linux and two network wireless adapters, one of which must be capable of packet injection. You can use the tried and true AWUS036NHA, or check out our guide on picking the best wireless network adapter for Kali Linux.
You may use others, but before you do, make certain that it is compatible with Aircrack-ng
(packet injection capable). Please do NOT post questions on why it
doesn't work until you check if your wireless adapter can do packet
injection. Most cannot.
Step 1 Download Wifiphisher
To begin, fire up Kali and open a terminal. Then download Wifiphisher from GitHub and unpack the code.
kali > tar -xvzf /root/wifiphisher-1.1.tar.gz
Alternatively, you can clone the code from GitHub by typing:
kali > git clone https://github/sophron/wifiphisher
Step 2 Navigate to the Directory
Next, navigate to the directory that Wifiphisher created when it was unpacked. In my case, it is /wifiphisher-1.1.
kali > cd wifiphisher-.1.1
When listing the contents of that directory, you will see that the wifiphisher.py script is there.
Step 3 Run the Script
You can run the Wifiphisher script by typing:
kali > python wifiphisher.py
The first time you run the script, it will likely tell you that "hostapd" is not found and will prompt you to install it. Install by typing "y" for yes. It will then proceed to install hostapd.
When it has completed, once again, execute the Wifiphisher script.
kali > python wifiphisher.py
Step 4 Send Your Attack and Get the Password
Go ahead and hit Ctrl + C on your keyboard and you will be prompted for the number of the AP that you would like to attack. In my case, it is 12.
When you hit Enter, Wifiphisher will display a screen like the one below that indicates the interface being used and the SSID of the AP being attacked and cloned.
The target user has been de-authenticated from their AP. When they re-authenticate, they will directed to the the cloned evil twin access point.