How the Tool Works
- It endlessly jams all of the target access point’s WLAN devices inside vary by shaping “de-authenticate” or “Disassociate” packets to disrupt existing associations.
- Also, it sniffs the realm and copies the target access point’s settings. It then creates a villain wireless access purpose that’s shapely by the target. It conjointly sets up a NAT/DHCP server and forwards the correct ports.
- Ir employs a stripped-down net server that responds to hypertext transfer protocol & HTTPS requests. As shortly because the victim requests a page from the net, wifiphisher can respond with a sensible pretend page that asks for credentials or serves malware.
Requirments
- 1x Wireless Interface that backings Managed mode.
- 1x Wireless INterface that backings Monitor mode.
- Kali Linux or Linux Operating System
First step to WiFi Hacking
Installing WifiPhisher!
To start, start up Kali and open a terminal. At that point download Wifiphisher from GitHub and unload the code.
Installation
To install the latest development version type the following commands:
cd wifiphisher # Switch to tool's directory
sudo python setup.py install # Install any dependencies
# tape : wifiphisher /to run
To Launch the WifiPhispher and help
wifiphisher -h