Through these scripts it is possible to create Rogue or Fake Access Points and carry out an authentication downgrade attack against WPA and WPA2-Enterprise networks, obtaining passwords in hash format or cleartext (if GTC downgrade is successful).
Both the installation scripts, ISO files and virtual machines (in VMWare and VirtualBox format) are included.
Operating system | Platform | Credentials | Size | Link |
---|---|---|---|---|
Ubuntu 16.04.5 | VMware | ricardojoserf:wifi | 3.25 GB | MEGA |
Kali 2019.1 | VMware | root:wifi | 4.99 GB | MEGA |
Ubuntu 16.04.5 | VirtualBox (OVA) | ricardojoserf:wifi | 3.18 GB | MEGA |
Kali 2019.1 | VirtualBox (OVA) | root:wifi | 5.56 GB | MEGA |
Start the Access Point using:
sh freeradius_wpe_init.sh $AP_NAME $INTERFACE
Or if you are using the virtual machine:
freeradiuswpe $AP_NAME $INTERFACE
When a client connects, read logs with:
sh freeradius_wpe_read.sh
Or if you are using the virtual machine:
readlog
Result:
Start the Access Point using:
sh hostapd_wpe_init.sh $AP_NAME $INTERFACE
Or if you are using the virtual machine:
start_wpe $AP_NAME $INTERFACE
In case you do not want to use the virtual machine, you can install everything using:
sh install.sh