Tool and Usage
Wifiphisher is a security tool to perform automated and victim-customized phishing attacks against WiFi clients. It is useful for security assessments.
Why this tool?
Wifiphisher would have a good usage in security assessments to obtain credentials. In that regard it is considered to be an offensive tool, especially considering it could be used to infect the systems of victims with malware. Wifiphisher is not a brute forcing tool, but more focused to perform a social engineering attack.
How it works
- Step 1: deauthenticate victim from access point
- Step 2: victim joins the rogue access point
- Step 3: provide phishing page to victim
Wifiphisher continuously jams all of the target access point's WiFi devices within range. It forges “Deauthenticate” or “Disassociate” packets to disrupt existing associations. This
After the first step, the victim joins the rogue access point. This is achieved by listening to probe requests and additionally spoof any discovered open networks. The rogue access point used by the attacker will have the right settings in place that mimics the devices it targeted.
Now that the victim is using the rogue access point, it can be deceived by phishing pages. This way authentication details can be retrieved or malware can be served.
Usage and audience
Wifiphisher is commonly used for phishing attacks or WiFi security analysis. Target users for this tool are pentesters and security professionals.
- + More than 25 contributors
- + More than 5000 GitHub stars
- + The source code of this software is available
Author and Maintainers
Wifiphisher is under development by George Chatzisofroniou.
Support operating systems
Wifiphisher is known to work on Linux.