Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

New Wi-Fi attack method: "Deauth+Clone+Verify" #762

Open
wants to merge 5 commits into
base: main
Choose a base branch
from

Conversation

7wp81x
Copy link
Contributor

@7wp81x 7wp81x commented Feb 1, 2025

Proposed Changes

Added a new Wi-Fi attack method: "Deauth+Clone+Verify".

  • Deauths the target network.
  • Clones the network with the same SSID.
  • If the user enters the correct wireless password, the attack stops.
  • If the password is incorrect or not provided, deauthentication continues.

Types of Changes

"Deauth+Clone+Verify" New WiFi Attack Feature

Verification

Tested on CYD-2432S028 and CYD-2USB

Testing

Tested other Wifi atks feature that uses the evil_portal.cpp, seems working properly..

User-Facing Change

Added "Deauth+Clone+Verify" Wi-Fi attack, which forces users to authenticate by continuously deauthing until the correct password is provided.

Further Comments

Instead of stopping the deauth and manually checking the captured passwords, this new feature automates the process by continuously deauthing until the correct credentials are provided.

Check whether the received password is valid wireless password.
Added the ability to verify the wifi passwd submited by the client.
Some changes for wifi passwd verifier...
New Wi-Fi Attack Deauth+Clone+Verify
@GabriWar
Copy link

nice, tested and working, hoping for a merge soon

@Huzzla101
Copy link

Huzzla101 commented Feb 19, 2025 via email

@7wp81x
Copy link
Contributor Author

7wp81x commented Feb 20, 2025

the disadvantage of this is you must be at range of the target AP.. otherwise it can't verify the password.. also it will disconnect all the clients when checking the pwd...

but i have an idea.. i don't know if this can work on few lines code but.. here:

  1. We all know that it disconnect the clients from the AP and start a rouge AP right? so how about we capture the Handshake when it was disconnecting the clients from the AP... then after successful capture start the rouge AP and continue disconnecting...

  2. create a password checker... that will check whether the password provided on rouge AP (Evil portal) matches the handshake...?

sorry for my explaination

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants