Skip to content
D3Ext edited this page Jan 17, 2024 · 3 revisions

Performing a deauth attack

First of all I start the tool, in my case the network interface is called wlan0 so:

sudo wef -i wlan0

Then I type "enable" to enable monitor mode which is required to perform all attacks

 

Afer this I select the the deauthentication attack, by typing "1". It automatically proceeds to scan nearby APs on 2.4 GHz and 5 GHz as I have set in my config file frequency_band=auto so it detects the supported bands. Then I select my target and set the different attack options: deauth all clients (FF:FF:FF:FF:FF:FF), capture WPA/WPA2 handshakes and send 15 deauth frames

 

Now a little resume with attack info appears and waits until I press [Enter], then the attack starts. You can stop the attack anytime you want by pressing Ctrl+C

 

Once it has finished, a simple log to help you keeping track of your attacks is stored as /opt/wef/main/logs/<ap-name>.log

If you want you can also change your MAC address (macchanger) by typing "mac" before doing any attack

 

Here you can see some other commands

Performing an EvilTwin attack

We start by selecting the 15 option, we scan the APs and the select our target

 

After that we select the language of the captive portal and proceed to launch the attack

 

Then, four windows are open with the different tools used to create the rogue AP (hostapd, dnsmasq, lighttpd and the last one which shows gathered passwords)

 

And finally when someone introduces a passwords, it is shown on the bottom right window as you can see here

Clone this wiki locally