View Issue Details

IDProjectCategoryView StatusLast Update
0006565Kali Linux[All Projects] Queued Tool Additionpublic2021-08-12 13:57
ReporterMister_X Assigned Tosbrun  
PrioritynormalSeverityminorReproducibilityhave not tried
Status resolvedResolutionfixed 
Product Version 
Target VersionFixed in Version2021.3 
Summary0006565: EAPHammer - Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.
Description- [Name] - EAPHammer
- [Version] - v1.12.1
- [Homepage] - https://github.com/s0lst1c3/eaphammer
- [Download] - https://github.com/s0lst1c3/eaphammer/releases/tag/v1.12.1
- [Author] - s0lst1c3
- [Licence] - GNU General Public License v3.0
- [Description] - Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.
- [Dependencies] - apache2 dnsmasq libssl-dev libnfnetlink-dev libnl-3-dev libnl-genl-3-dev libcurl4-openssl-dev zlib1g-dev libpcap-dev
- [Similar tools] - hostapd-wpe, freeradius-wpe, hostapd-mana
- [How to install] - See Quick start guide in https://github.com/s0lst1c3/eaphammer/blob/master/README.md
- [How to use] - Documentation can be found at https://github.com/s0lst1c3/eaphammer/wiki
To steal RADIUS credentials by executing an evil twin attack against an EAP network, use the --creds flag as shown below.

./eaphammer --bssid 1C:7E:E5:97:79:B1 \
 --essid Example \
 --channel 2 \
 --interface wlan0 \
 --auth wpa-eap \
 --creds

Activities

g0tmi1k

2020-09-01 21:35

administrator   ~0013362

@kali-team, please could this be packaged up.

sbrun

2021-08-12 13:57

manager   ~0014993

version 1.13.5+git20201214-0kali3 is now in kali

Issue History

Date Modified Username Field Change
2020-07-11 22:36 Mister_X New Issue
2020-09-01 21:35 g0tmi1k Note Added: 0013362
2020-09-01 21:35 g0tmi1k Status new => acknowledged
2020-09-01 21:35 g0tmi1k Category New Tool Requests => Queued Tool Addition
2020-09-01 21:35 g0tmi1k Product Version 2020.2 =>
2020-12-01 11:06 g0tmi1k Summary EAPHammer => EAPHammer - Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.
2021-07-13 08:06 sbrun Assigned To => sbrun
2021-07-13 08:06 sbrun Status acknowledged => assigned
2021-08-12 13:57 sbrun Status assigned => resolved
2021-08-12 13:57 sbrun Resolution open => fixed
2021-08-12 13:57 sbrun Fixed in Version => 2021.3
2021-08-12 13:57 sbrun Note Added: 0014993