-
-
Notifications
You must be signed in to change notification settings - Fork 228
Demo
First of all I start the tool, in my case the network interface is called wlan0 so:
sudo wef -i wlan0
Then I type "enable" to enable monitor mode which is required to perform all attacks
Afer this I select the the deauthentication attack, by typing "1". It automatically proceeds to scan nearby APs on 2.4 GHz and 5 GHz as I have set in my config file frequency_band=auto
so it detects the supported bands. Then I select my target and set the different attack options: deauth all clients (FF:FF:FF:FF:FF:FF), capture WPA/WPA2 handshakes and send 15 deauth frames
Now a little resume with attack info appears and waits until I press [Enter], then the attack starts. You can stop the attack anytime you want by pressing Ctrl+C
Once it has finished, a simple log to help you keeping track of your attacks is stored as /opt/wef/main/logs/<ap-name>.log
If you want you can also change your MAC address (macchanger) by typing "mac" before doing any attack
Here you can see some other commands
We start by selecting the 15 option, we scan the APs and the select our target
After that we select the language of the captive portal and proceed to launch the attack
Then, four windows are open with the different tools used to create the rogue AP (hostapd, dnsmasq, lighttpd and the last one which shows gathered passwords)
And finally when someone introduces a passwords, it is shown on the bottom right window as you can see here