Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Create WiFi with password, if password is entered from a device, you see it on your Flipper #233

Closed
Choder7 opened this issue Sep 23, 2024 · 6 comments
Labels
feature New feature or request invalid This doesn't seem right

Comments

@Choder7
Copy link

Choder7 commented Sep 23, 2024

Description of the feature you're suggesting.

I just thought of another WiFi attack method, but I didn't seem to find it anywhere, if it already exists or isn't possible, please inform me, thanks! 👍

The Attack would probably be in Marauder, you would be able to add new ssid, select it, (already possible), and then create a wifi with password authentication, you could name it like another WiFi or choose an ap that's already existing, or just choose all ap's, then it would create a wifi with password (or multiple).

If anybody connects to it typing in their password, you should see it on the Flipper. You should also be able to combine this with the deauth attack, so that every wifi is getting desired, while there are duplicates for each wifi hosted from the Flipper, the targets will think somethings wrong with their router, see that there's two of his WiFi's, connect to the fake one because they can't connect to the real and think it's maybe a bug of their phone, because they see every WiFi doubled, after trying to connect to the fake WiFi hosted from the Flipper, the phone requests a password, after entwring their WiFi Password, we have the targets password and the name of the router he was trying to comnect to.

Anything else?

No response

@Willy-JL
Copy link
Member

I'm not super familiar with how WiFi handshakes work at a low level, but I'm pretty sure the plaintext password is not sent over the air, instead the password is hashed, and the hash is sent. So, you can't see what password the user typed. Stick to successful sniff pmkid attacks.

@Willy-JL Willy-JL added invalid This doesn't seem right feature New feature or request labels Sep 23, 2024
@Willy-JL Willy-JL closed this as not planned Won't fix, can't repro, duplicate, stale Sep 23, 2024
@ZProLegend007
Copy link

ZProLegend007 commented Sep 24, 2024

Something similar to this is usually executed by hosting a web server for a "login" page of an open network. That webpage would then ask you to enter a password to login (or a username and password, there can be many variations) and that password can be sent as plaintext to the flipper. However it's unlikely that the flipper has the hardware capabilities to do this and it would take a lot of work.

This has been implemented in airgeddon which is a powerful pen-testing tool for linux. In the tool there is also the option to capture a handshake from the original network so that when a password is entered, it can be hashed and compared to the hash of the password found in the handshake and therefore trigger a shutdown of the fake network after the right password is found.

Edit: Flipper can do it! 🎉

@Helios343
Copy link

Helios343 commented Sep 24, 2024 via email

@Willy-JL
Copy link
Member

yep what @ZProLegend007 describes is an evil portal / evil twin attack, available in marauder and included in momentum.

@Choder7
Copy link
Author

Choder7 commented Oct 8, 2024

How do you do the attack with the hash @ZProLegend007 mentioned? 🤔❓

@Willy-JL
Copy link
Member

Willy-JL commented Oct 8, 2024

@Choder7 evil portal, flash any esp32 board with marauder using the esp flasher app and then use either marauder app or evil portal app to load an html, set a name, and start the portal.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
feature New feature or request invalid This doesn't seem right
Projects
None yet
Development

No branches or pull requests

4 participants