14
Information Security Inc. Wifiphisher

Wifiphisher - 情報セキュリティ株式会社Information Security Confidential - Partner Use Only Requirements 4 •Kali Linux. Although people have made Wifiphisher work on other

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Wifiphisher - 情報セキュリティ株式会社Information Security Confidential - Partner Use Only Requirements 4 •Kali Linux. Although people have made Wifiphisher work on other

Information Security Inc.

Wifiphisher

Page 2: Wifiphisher - 情報セキュリティ株式会社Information Security Confidential - Partner Use Only Requirements 4 •Kali Linux. Although people have made Wifiphisher work on other

Information Security Confidential - Partner Use Only

Contents

2

• About Wifiphisher

• Requirements

• How it works

• Testing Environment

• Installing Wifiphisher

• Using Wifiphisher

• References

Page 3: Wifiphisher - 情報セキュリティ株式会社Information Security Confidential - Partner Use Only Requirements 4 •Kali Linux. Although people have made Wifiphisher work on other

Information Security Confidential - Partner Use Only

About Wifiphisher

3

• Wifiphisher is a security tool that mounts automated victim-

customized phishing attacks against WiFi clients in order to obtain

credentials or infect the victims with malwares

Page 4: Wifiphisher - 情報セキュリティ株式会社Information Security Confidential - Partner Use Only Requirements 4 •Kali Linux. Although people have made Wifiphisher work on other

Information Security Confidential - Partner Use Only

Requirements

4

• Kali Linux. Although people have made Wifiphisher work on other

distros, Kali Linux is the officially supported distribution, thus all

new features are primarily tested on this platform

Page 5: Wifiphisher - 情報セキュリティ株式会社Information Security Confidential - Partner Use Only Requirements 4 •Kali Linux. Although people have made Wifiphisher work on other

Information Security Confidential - Partner Use Only

Requirements

5

• One wireless network adapter that supports AP & Monitor mode

and is capable of injection. For advanced mode, you need two

cards; one that supports AP mode and another that supports

Monitor mode

Page 6: Wifiphisher - 情報セキュリティ株式会社Information Security Confidential - Partner Use Only Requirements 4 •Kali Linux. Although people have made Wifiphisher work on other

Information Security Confidential - Partner Use Only

How it works

6

• Victim is being deauthenticated from her access point. Wifiphisher

continuously jams all of the target access point's wifi devices

within range by forging “Deauthenticate” or “Disassociate” packets

to disrupt existing associations

• Victim joins a rogue access point

• Victim is being served a realistic

specially-customized phishing page

Page 7: Wifiphisher - 情報セキュリティ株式会社Information Security Confidential - Partner Use Only Requirements 4 •Kali Linux. Although people have made Wifiphisher work on other

Information Security Confidential - Partner Use Only

Testing Environment

7

• Kali Linux 2017

Page 8: Wifiphisher - 情報セキュリティ株式会社Information Security Confidential - Partner Use Only Requirements 4 •Kali Linux. Although people have made Wifiphisher work on other

Information Security Confidential - Partner Use Only

Installing Wifiphisher

8

• Installing Wifiphisher

Page 9: Wifiphisher - 情報セキュリティ株式会社Information Security Confidential - Partner Use Only Requirements 4 •Kali Linux. Although people have made Wifiphisher work on other

Information Security Confidential - Partner Use Only

Using Wifiphisher

9

• Starting Wifiphisher

Page 10: Wifiphisher - 情報セキュリティ株式会社Information Security Confidential - Partner Use Only Requirements 4 •Kali Linux. Although people have made Wifiphisher work on other

Information Security Confidential - Partner Use Only

Using Wifiphisher

10

• Finding APs

Page 11: Wifiphisher - 情報セキュリティ株式会社Information Security Confidential - Partner Use Only Requirements 4 •Kali Linux. Although people have made Wifiphisher work on other

Information Security Confidential - Partner Use Only

Using Wifiphisher

11

• Copying the AP and choosing the phishing scenario

Page 12: Wifiphisher - 情報セキュリティ株式会社Information Security Confidential - Partner Use Only Requirements 4 •Kali Linux. Although people have made Wifiphisher work on other

Information Security Confidential - Partner Use Only

Using Wifiphisher

12

• Starting the fake AP

Page 13: Wifiphisher - 情報セキュリティ株式会社Information Security Confidential - Partner Use Only Requirements 4 •Kali Linux. Although people have made Wifiphisher work on other

Information Security Confidential - Partner Use Only

Using Wifiphisher

13

• Capturing WPA key

Page 14: Wifiphisher - 情報セキュリティ株式会社Information Security Confidential - Partner Use Only Requirements 4 •Kali Linux. Although people have made Wifiphisher work on other

Information Security Confidential - Partner Use Only

References

14

• Kitploit

http://www.kitploit.com/2016/12/wifiphisher-v12-automated-victim.html

• Kali Linux 2017

https://www.kali.org/downloads/