View Issue Details

IDProjectCategoryView StatusLast Update
0006565Kali Linux[All Projects] Queued Tool Additionpublic2020-09-01 21:35
ReporterMister_X Assigned To 
PrioritynormalSeverityminorReproducibilityhave not tried
Status acknowledgedResolutionopen 
Product Version 
Target VersionFixed in Version 
Summary0006565: EAPHammer
Description- [Name] - EAPHammer
- [Version] - v1.12.1
- [Homepage] - https://github.com/s0lst1c3/eaphammer
- [Download] - https://github.com/s0lst1c3/eaphammer/releases/tag/v1.12.1
- [Author] - s0lst1c3
- [Licence] - GNU General Public License v3.0
- [Description] - Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.
- [Dependencies] - apache2 dnsmasq libssl-dev libnfnetlink-dev libnl-3-dev libnl-genl-3-dev libcurl4-openssl-dev zlib1g-dev libpcap-dev
- [Similar tools] - hostapd-wpe, freeradius-wpe, hostapd-mana
- [How to install] - See Quick start guide in https://github.com/s0lst1c3/eaphammer/blob/master/README.md
- [How to use] - Documentation can be found at https://github.com/s0lst1c3/eaphammer/wiki
To steal RADIUS credentials by executing an evil twin attack against an EAP network, use the --creds flag as shown below.

./eaphammer --bssid 1C:7E:E5:97:79:B1 \
 --essid Example \
 --channel 2 \
 --interface wlan0 \
 --auth wpa-eap \
 --creds

Activities

g0tmi1k

2020-09-01 21:35

administrator   ~0013362

@kali-team, please could this be packaged up.

Issue History

Date Modified Username Field Change
2020-07-11 22:36 Mister_X New Issue
2020-09-01 21:35 g0tmi1k Note Added: 0013362
2020-09-01 21:35 g0tmi1k Status new => acknowledged
2020-09-01 21:35 g0tmi1k Category New Tool Requests => Queued Tool Addition
2020-09-01 21:35 g0tmi1k Product Version 2020.2 =>