roguehostapd
roguehostapd copied to clipboard
Supporting Evil-Twin attacks on enterprise networks
This is a very interesting project and I liked how the API was used in WiFiPhisher. I also use hostapd in my project, but in my case I just write the hostapd.conf file and call hostapd-wpe with Popen. I'm not sure you know this but hostapd-wpe (wireless pwning edition) is a patch for hostapd that facilitates Evil-Twin attacks on enterprise networks (WPA-EAP and such). The patched version is being actively maintained by the authors of aircrack-ng. Since this project was mainly to developed for WiFiPhisher I think this would be a great addition to the project.
Also I would like to use this library in my project but it needs to support WPA-EAP.
@Esser420 thanks for opening the first issue : )
The reason why we don't use hostapd-wpe
and hostapd-mana
are as following:
-
Since we need a good python binding so we decide to patch the hostapd by ourself.
-
If you have saw the implementation of
roguehostapd
, you'll discover that we don't usePopen
to fork the hostapd process and instead we build the hostapd as the shared library and usectype
to bind the c-functions we're interested in.
I guess @sophron also plans about the enterprise network attack
: )
[BTW]
Currently if you want to use KARMA attack in wifiphisher. You need to do pip install roguehostapd
first;otherwise, wifiphisher
will still lunch the system hostapd
.
Hi @Esser420,
Thanks for reaching out. Yes, we definitely plan to implement Evil Twin against Enterprise WLANs. That was one of the reasons behind the creation of roguehostapd
(#569).
roguehostapd
is open-source and you are welcome to use it on your project. Note that we are currently dealing with some distribution issues that we should solve soon.