Saturday, 6 January 2018
0 comments

PiKarma: To Detects Wireless Network Attack


Detects wireless network attacks performed by KARMA module


It Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points).

Working Principle for PiKarma

  • Collects all the packets from Wireless Network. (Probe Response)
  • Analyses all the packets in real time.
  • If PiKarma finds more than one SSID info from unique mac address in Probe Response;
  • Logs the activity with some extra information within defined template and sends deauthentication packets

How works KARMA Attack?


  • Sends Probe Response for all Probe Requests


Example:


Softwares and hardwares that uses KARMA module
  • FruityWifi
  • WiFi Pineapple
  • Mana (improvements to KARMA attacks)


TO Check all DEMO click the following YouTube Link
https://www.youtube.com/playlist?list=PLwHi7Vsh6TpNrCX87KRzO9WVtHmqqC2aB

Usage

Requirements


  • Hardware: TP LINK TL-WN722N or Dark RangeMax wifi card
  • Modules: scapy, time, termcolor, argparse, netifaces, logging

Kali Linux:

Download PiKarma:

git clone https://github.com/WiPi-Hunter/PiKarma.git

Install Python librarie(s):

pip install termcolor

It's done!

Run the program with following command:

Monitor mode:


airmon-ng start interface(wlan0,wlan1) (Monitor mode)

or

ifconfig wlan0 down
iwconfig wlan0 mode Monitor
ifconfig wlan0 up

Run:

cd PiKarma
python PiKarma.py -h


Download

0 comments:

Post a Comment

Note: only a member of this blog may post a comment.

 
Toggle Footer
Top