Tool and Usage
Why this tool?
EAPHammer is a toolkit to perform a targeted evil twin attack against WPA2-Enterprise networks. It can be used during security assessments of the wireless network. The focus of EAPHammer is to provide a powerful interface while still being easy to use.
The attacks and features that EAPHammer supports are evil twin and karma attack, SSID cloaking, steal RADIUS credentials (WPA-EAP and WPA2-EAP), and hostile portal attacks to capture Active Directory credentials or perform indirect wireless pivots.
EAPHammer has an extensive set of features and comes with several WiFi related attacks. The GitHub page of the project has good documentation on the types of attacks and the requirements to perform them.
How it works
With EAPHammer being a very focused tool on WiFI security, it has a number of options that can be provided given a particular attack. Typically only one or two commands needs to be provided to perform the attack.
EAPHammer is developed to work on Kali Linux and needs the following dependencies: apache2, dnsmasq, libssl-dev, libnfnetlink-dev, libnl-3-dev, libnl-genl-3-dev.
Usage and audience
EAPHammer is commonly used for credential stealing, network security assessment, or network spoofing. Target users for this tool are pentesters and security professionals.
- Command line interface
Example usage and output
Tool review and remarks
The review and analysis of this project resulted in the following remarks for this security tool:
- + More than 500 GitHub stars
- + The source code of this software is available
- - No releases on GitHub available
History and highlights
- Demo at Black Hat USA 2017 Arsenal
- Demo at DEF CON 26 Demo Labs
Supported operating systems
EAPHammer is known to work on Linux.
Similar tools to EAPHammer:
Trackerjacker is a security tool to map WiFi networks that you are not connected to. Read the review on how trackerjacker how it works and its strengths.
Wifiphisher is a security tool to perform automated and victim-customized phishing attacks against WiFi clients. It is useful for security assessments.
Wireshark is the well-known network protocol analyzer. It allows you to see what is happening on the network and zoom into the details of the network protocols.
This tool page was updated at . Found an improvement? Help the community by submitting an update.