Saturday, 6 January 2018
0 comments

PiKarma- To Detects Wireless Network Attack


Detects wireless network attacks performed by KARMA module


  • It Detects wireless network attacks performed by KARMA module (fake AP). 
  • Starts deauthentication attack (for fake access points).

Working Principle for PiKarma

  • Collects all the packets from Wireless Network. (Probe Response)
  • Analyses all the packets in real time.
  • If PiKarma finds more than one SSID info from unique mac address in Probe Response;
  • Logs the activity with some extra information within defined template and sends deauthentication packets

How works KARMA Attack?

  • Sends Probe Response for all Probe Requests

Example:


Softwares and hardwares that uses KARMA module
  • FruityWifi
  • WiFi Pineapple
  • Mana (improvements to KARMA attacks)


TO Check all DEMO click the following YouTube Link
https://www.youtube.com/playlist?list=PLwHi7Vsh6TpNrCX87KRzO9WVtHmqqC2aB

Usage

Requirements

  • Hardware: TP LINK TL-WN722N or Dark RangeMax wifi card
  • Modules: scapy, time, termcolor, argparse, netifaces, logging

Kali Linux:

Download PiKarma:

git clone https://github.com/WiPi-Hunter/PiKarma.git

Install Python librarie(s):

pip install termcolor

It's done!

Run the program with following command:

Monitor mode:


airmon-ng start interface(wlan0,wlan1) (Monitor mode)

or

ifconfig wlan0 down
iwconfig wlan0 mode Monitor
ifconfig wlan0 up

Run:

cd PiKarma
python PiKarma.py -h


Download

0 comments:

Post a Comment

Note: only a member of this blog may post a comment.

 
Toggle Footer
Top