Header Ads Widget

Responsive Advertisement

Detects Wireless Network Attacks Performed by KARMA Module

PiKarma: To Detects Wireless Network Attack



It Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points).

Working Principle for PiKarma

  • Collects all the packets from Wireless Network. (Probe Response)
  • Analyses all the packets in real time.
  • If PiKarma finds more than one SSID info from unique mac address in Probe Response;
  • Logs the activity with some extra information within defined template and sends deauthentication packets

How works KARMA Attack?


  • Sends Probe Response for all Probe Requests


Example:


Softwares and hardwares that uses KARMA module
  • FruityWifi
  • WiFi Pineapple
  • Mana (improvements to KARMA attacks)


TO Check all DEMO click the following YouTube Link
https://www.youtube.com/playlist?list=PLwHi7Vsh6TpNrCX87KRzO9WVtHmqqC2aB

Usage

Requirements


  • Hardware: TP LINK TL-WN722N or Dark RangeMax wifi card
  • Modules: scapy, time, termcolor, argparse, netifaces, logging

Kali Linux:

Download PiKarma:

git clone https://github.com/WiPi-Hunter/PiKarma.git

Install Python librarie(s):

pip install termcolor

It's done!

Run the program with following command:

Monitor mode:


airmon-ng start interface(wlan0,wlan1) (Monitor mode)

or

ifconfig wlan0 down
iwconfig wlan0 mode Monitor
ifconfig wlan0 up

Run:

cd PiKarma
python PiKarma.py -h





source:hoc

Post a Comment

0 Comments