Monday, 28 May 2018

PiKarma - Detects Wireless Network attacks performed by KARMA Module (Fake AP)

Screenshots

Working Principle for PiKarma
 * Collects all the packets from Wireless Network. (Probe Response)
 * Analyses all the packets in real time.
 * If PiKarma finds more than one SSID info from unique mac address in Probe Response;
 * Logs the activity with some extra information within defined template and sends deauthentication packets

How KARMA Attack works?
   Sends Probe Response for all Probe Requests
   Example:
Softwares and hardwares that uses KARMA module
 * FruityWifi
 * WiFi Pineapple
 * Mana (improvements to KARMA attacks)
 * ...

Soon to be added features
 * New techniques for detect KARMA and MANA attacks
 * Logging SSID information used in KARMA and MANA attack

VIDEO DEMO:

Requirements
 * Hardware: TP LINK TL-WN722N or Dark RangeMax wifi card
 * Modules: scapy, time, termcolor, argparse, netifaces, logging

Install: GitHackTools recommends that you should install PiKarma on Pentest OS like Kali Linux or Parrot Security OS

   git clone https://github.com/WiPi-Hunter/PiKarma
   sudo pip install termcolor
   cd PiKarma
   python PiKarma.py -h (PiKarma help menu)

Monitor mode:
   airmon-ng start interface (wlan0,wlan1) (Monitor mode)
   or
   ifconfig wlan0 down
   iwconfig wlan0 mode Monitor
   ifconfig wlan0 up


No comments:

Post a Comment