Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/mvondracek/wifimitm

Wi-Fi Machine-in-the-Middle: Automation of MitM Attack on Wi-Fi Networks
https://github.com/mvondracek/wifimitm

accessing-secured-wireless-networks dictionary-personalization impersonation man-in-the-middle-attack password-cracking phishing tampering-network-topology wep wlan wpa wpa2

Last synced: 2 months ago
JSON representation

Wi-Fi Machine-in-the-Middle: Automation of MitM Attack on Wi-Fi Networks

Awesome Lists containing this project

README

        



wifimitm logo

## Wi-Fi Machine-in-the-Middle: Automation of MitM Attack on Wi-Fi Networks
[![Target OS](https://img.shields.io/badge/Target%20OS-Arch%20Linux-0077bb.svg?style=flat-square)](https://www.archlinux.org/)
[![Python version](https://img.shields.io/badge/Python-3-blue.svg?style=flat-square)](https://www.python.org/)
[![PRs Welcome](https://img.shields.io/badge/PRs-welcome-brightgreen.svg?style=flat-square)](http://makeapullrequest.com)

![Is your network secure? How easy is it for someone to eavesdrop on you?](http://mvondracek.github.io/wifimitm/assets/header.png)

* [Author](https://mvondracek.github.io/wifimitm/author/)
* [Videos](http://mvondracek.github.io/wifimitm/videos/)
* [Slides](http://mvondracek.github.io/wifimitm/slides/)

* [Manual](http://mvondracek.github.io/wifimitm/manual/)

* [Poster (cz)](http://mvondracek.github.io/wifimitm/assets/wifimitm-poster-cz.pdf)
* [Bachelor's thesis](http://www.fit.vutbr.cz/study/DP/BP.php.en?id=18596)
* [Software product in NES@FIT research group](http://www.fit.vutbr.cz/research/prod/index.php.en?id=487)

### Abstract

Widely used network technologies and principles of wireless security suffer weaknesses that can be exploited to perform the Man-in-the-Middle attack, allowing to eavesdrop or to spoof the network communication. The work focuses on possibilities of automation of the attack with a utilization of available specialized tools. The outcome of the research is the wifimitm package and the wifimitmcli CLI tool, both implemented in Python. The emphasis was placed on possibilities of further incorporation of the developed tool. The package provides functionality for automated MitM attack and can be used by other software. The wifimitmcli tool is capable of performing a successful fully automated attack without any intervention from an attacker.

This research can be used for automated penetration testing and forensic investigation. Finally, a popularization of the fact that such severe attacks can be successfully automated should be used to raise the public awareness about the information security. In these days, this issue involves almost every one of us.