View Issue Details
ID | Project | Category | View Status | Date Submitted | Last Update |
---|---|---|---|---|---|
0006565 | Kali Linux | [All Projects] Queued Tool Addition | public | 2020-07-11 22:36 | 2021-08-12 13:57 |
Reporter | Mister_X | Assigned To | sbrun | ||
Priority | normal | Severity | minor | Reproducibility | have not tried |
Status | resolved | Resolution | fixed | ||
Product Version | |||||
Target Version | Fixed in Version | 2021.3 | |||
Summary | 0006565: EAPHammer - Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks. | ||||
Description | - [Name] - EAPHammer - [Version] - v1.12.1 - [Homepage] - https://github.com/s0lst1c3/eaphammer - [Download] - https://github.com/s0lst1c3/eaphammer/releases/tag/v1.12.1 - [Author] - s0lst1c3 - [Licence] - GNU General Public License v3.0 - [Description] - Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks. - [Dependencies] - apache2 dnsmasq libssl-dev libnfnetlink-dev libnl-3-dev libnl-genl-3-dev libcurl4-openssl-dev zlib1g-dev libpcap-dev - [Similar tools] - hostapd-wpe, freeradius-wpe, hostapd-mana - [How to install] - See Quick start guide in https://github.com/s0lst1c3/eaphammer/blob/master/README.md - [How to use] - Documentation can be found at https://github.com/s0lst1c3/eaphammer/wiki To steal RADIUS credentials by executing an evil twin attack against an EAP network, use the --creds flag as shown below. ./eaphammer --bssid 1C:7E:E5:97:79:B1 \ --essid Example \ --channel 2 \ --interface wlan0 \ --auth wpa-eap \ --creds | ||||
Date Modified | Username | Field | Change |
---|---|---|---|
2020-07-11 22:36 | Mister_X | New Issue | |
2020-09-01 21:35 | g0tmi1k | Note Added: 0013362 | |
2020-09-01 21:35 | g0tmi1k | Status | new => acknowledged |
2020-09-01 21:35 | g0tmi1k | Category | New Tool Requests => Queued Tool Addition |
2020-09-01 21:35 | g0tmi1k | Product Version | 2020.2 => |
2020-12-01 11:06 | g0tmi1k | Summary | EAPHammer => EAPHammer - Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks. |
2021-07-13 08:06 | sbrun | Assigned To | => sbrun |
2021-07-13 08:06 | sbrun | Status | acknowledged => assigned |
2021-08-12 13:57 | sbrun | Status | assigned => resolved |
2021-08-12 13:57 | sbrun | Resolution | open => fixed |
2021-08-12 13:57 | sbrun | Fixed in Version | => 2021.3 |
2021-08-12 13:57 | sbrun | Note Added: 0014993 |