Detects wireless network attacks performed by KARMA module
- It Detects wireless network attacks performed by KARMA module (fake AP).
- Starts deauthentication attack (for fake access points).
Working Principle for PiKarma
- Collects all the packets from Wireless Network. (Probe Response)
- Analyses all the packets in real time.
- If PiKarma finds more than one SSID info from unique mac address in Probe Response;
- Logs the activity with some extra information within defined template and sends deauthentication packets
How works KARMA Attack?
- Sends Probe Response for all Probe Requests
Example:
Softwares and hardwares that uses KARMA module
- FruityWifi
- WiFi Pineapple
- Mana (improvements to KARMA attacks)
TO Check all DEMO click the following YouTube Link
https://www.youtube.com/playlist?list=PLwHi7Vsh6TpNrCX87KRzO9WVtHmqqC2aB
Usage
Requirements
- Hardware: TP LINK TL-WN722N or Dark RangeMax wifi card
- Modules: scapy, time, termcolor, argparse, netifaces, logging
Kali Linux:
Download PiKarma:git clone https://github.com/WiPi-Hunter/PiKarma.git
Install Python librarie(s):
pip install termcolorIt's done!
Run the program with following command:
Monitor mode:
airmon-ng start interface(wlan0,wlan1) (Monitor mode)
or
ifconfig wlan0 down
iwconfig wlan0 mode Monitor
ifconfig wlan0 up
Run:
cd PiKarmapython PiKarma.py -h
Download
0 comments:
Post a Comment
Note: only a member of this blog may post a comment.