Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the crayon-syntax-highlighter domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home1/ktech37/public_html/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the otw_dcsw domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home1/ktech37/public_html/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the easy-accordion-free domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home1/ktech37/public_html/wp-includes/functions.php on line 6114
How to Hack WI-Fi using Wifiphisher » KryptosTechnology
Hack WiFi Using Wifiphisher

How to Hack WI-Fi using Wifiphisher

Wifiphister is a wireless security tool which can be used to launch phishing attacks against targeted Wi-Fi network to gain access to a wifi network and steal credentials, infecting the network with a virus and launch DDoS Attack.


T

he method of attack that we will be using to hack wifi using WiFi-phishers it’s a techniques in which is well known in the hacking community as social engineering attack in which when compared to other techniques it doesn’t brute force it way on cracking the pass code its simple generate a captive portal page and request the victims to input their wifi credentials for a firmware upgrade.


How does this tool works.


  • It first jams the wireless network access point’s, in which it de-authenticate or disassociate all devices that are connected the targeted access points by sending disruptive packets towards it.
  • The tool also sniffs the targeted access point settings and copy over the configuration which then are use to generate fake access points with the same settings (Evil twin wireless network).
  • Its then employs a stripped-down net server which then responds with HTTPS (Hyper Text Transfer Protocol secure) in real time requesting your WiFi credentials.

Wifiphisher wireless network hacking Demo.

This Tutorial will base of Kali Linux OS, you will need to download wifiphisher from here on gitHub. Open your terminal and follow the instruction listed below.


Here is the prerequisite that WifiPhisher needs to work successfully.


  • apt-get install libnl-3-dev libnl-genl-3-dev
  • git clone https://github.com/wifiphisher/roguehostapd.git
  • cd roguehostapd/
  • python setup.py install
  • git clone https://github.com/wifiphisher/wifiphisher.git
  • cd wifiphisher
  • sudo python setup.py install
  • apt install wifiphisher

Hack WiFi Using Wifiphisher

Launch wifiphisher from your terminal.

:~# wifiphisher

Here we select your targeted WiFi network by using arrow keys to cycle between your options and enter to the keyboard to activate. 



Now you need to select the attack method i strongly recommend option 2 (Firmware Upgrade Page) it’s more convincing and it won’t frustrate the user like how method option 1 (Network Manager Connect) would work.




The image below shows the fake AP that was generated by WiFiPhisher and what the victims will see.

So when the victim connects to one of our fake AP (Access point) and get redirected to our Firmware upgrade page and hopefully agree to the terms & conditions, then enter their wireless passcode it will then be displayed like in the image below.



THIS IS NOT A JOKE!
MISUSE OF THIS TOOL RESULTS
IN CRIME! AND THE RESPONSIBILITY IS
ONLY YOURS
.


Okay everyone let me know what you think about this article in the comment sections, this tool is not limited to just WiFi hacking, it also can be used for Facebook phishing attack with option 4 0Auth login page.