Description |
- [Name] - wpa_sycophant
- [Version] - 1.0
- [Homepage] - https://github.com/sensepost/wpa_sycophant
- [Download] - https://github.com/sensepost/wpa_sycophant/releases/tag/v1.0
- [Author] - Cablethief, Sensepost
- [Licence] - https://github.com/sensepost/wpa_sycophant/blob/v1.0/README
- [Description] - Evil client portion of EAP relay attack
- [Dependencies] - hostapd-mana openssl
- [Similar tools] - hostapd-mana
- [How to install] -
cd wpa_supplicant
make
make install
Rename wpa_supplicant to wpa_sycophant (AFAIK, no need for any other binary)
- [How to use] -
Create configuration file:
network={
ssid="TestingEAP"
The SSID you would like to relay and authenticate against.
scan_ssid=1
key_mgmt=WPA-EAP
Do not modify
identity=""
anonymous_identity=""
password=""
This initialises the variables for me.
-------------
eap=PEAP
phase1="crypto_binding=0 peaplabel=0"
phase2="auth=MSCHAPV2"
Dont want to connect back to ourselves,
so add your rogue BSSID here.
bssid_blacklist=00:14:22:01:23:45
}
Run: wpa_sycophant.sh -c wpa_sycophant_example.conf -i wlan0
|
---|