View Issue Details

IDProjectCategoryView StatusLast Update
0006565Kali Linux[All Projects] New Tool Requestspublic2020-07-11 22:36
ReporterMister_X Assigned To 
PrioritynormalSeverityminorReproducibilityhave not tried
Status newResolutionopen 
Product Version2020.2 
Target VersionFixed in Version 
Summary0006565: EAPHammer
Description- [Name] - EAPHammer
- [Version] - v1.12.1
- [Homepage] - https://github.com/s0lst1c3/eaphammer
- [Download] - https://github.com/s0lst1c3/eaphammer/releases/tag/v1.12.1
- [Author] - s0lst1c3
- [Licence] - GNU General Public License v3.0
- [Description] - Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.
- [Dependencies] - apache2 dnsmasq libssl-dev libnfnetlink-dev libnl-3-dev libnl-genl-3-dev libcurl4-openssl-dev zlib1g-dev libpcap-dev
- [Similar tools] - hostapd-wpe, freeradius-wpe, hostapd-mana
- [How to install] - See Quick start guide in https://github.com/s0lst1c3/eaphammer/blob/master/README.md
- [How to use] - Documentation can be found at https://github.com/s0lst1c3/eaphammer/wiki
To steal RADIUS credentials by executing an evil twin attack against an EAP network, use the --creds flag as shown below.

./eaphammer --bssid 1C:7E:E5:97:79:B1 \
 --essid Example \
 --channel 2 \
 --interface wlan0 \
 --auth wpa-eap \
 --creds

Activities

There are no notes attached to this issue.

Issue History

Date Modified Username Field Change
2020-07-11 22:36 Mister_X New Issue