Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/wifiphisher/roguehostapd
Hostapd fork including Wi-Fi attacks and providing Python bindings with ctypes.
https://github.com/wifiphisher/roguehostapd
hostapd python wifi
Last synced: about 1 month ago
JSON representation
Hostapd fork including Wi-Fi attacks and providing Python bindings with ctypes.
- Host: GitHub
- URL: https://github.com/wifiphisher/roguehostapd
- Owner: wifiphisher
- License: bsd-3-clause
- Created: 2017-05-21T16:24:10.000Z (over 7 years ago)
- Default Branch: master
- Last Pushed: 2021-04-27T10:09:04.000Z (over 3 years ago)
- Last Synced: 2024-10-02T08:37:37.681Z (3 months ago)
- Topics: hostapd, python, wifi
- Language: C
- Homepage:
- Size: 2.04 MB
- Stars: 171
- Watchers: 17
- Forks: 67
- Open Issues: 10
-
Metadata Files:
- Readme: README.md
- License: LICENSE.txt
Awesome Lists containing this project
README
# roguehostapd
Roguehostapd is a fork of hostapd, the famous user space software access point. It provides Python ctypes bindings and a number of additional attack features. It was primarily developed for use in the Wifiphisher project.## Build
To build the latest development version type the following commands:
```bash
git clone https://github.com/wifiphisher/roguehostapd.git # Download the latest version
cd roguehostapd # Switch to the roguehostapd directory
python setup.py install # Build the shared library of hostapd
```## Usage
***
```shell
python run.py -i wlan0 -ssid haha
```Use wlan0 for spawning the OPEN rogue AP on channel 6 and the ssid is haha.
***
```shell
python run.py -i wlan0 -ssid haha -pK 12345678
```Use wlan0 for spawning the WPA2/WPA rogue AP with passhrase 12345678
***
```shell
python run.py -i wlan0 -ssid haha -kA
```Use wlan0 for spawning the OPEN rogue AP supporting the KARMA attack.
***
```python
HOSTAPD_CONFIG_DICT = {
'ssid': 'haha',
'interface': 'wlan0',
'karma_enable': 1}
HOSTAPD_OPTION_DICT = {
'debug_level': hostapd_constants.HOSTAPD_DEBUG_OFF
}
HOSTAPD_OBJ = Hostapd()
HOSTAPD_OBJ.start(HOSTAPD_CONFIG_DICT, HOSTAPD_OPTION_DICT)
```The above configuration will perform the KARMA attack.
Following are all the options along with their descriptions (also available with `python run.py -h`)
| Short form | Long form | Explanation |
| :----------: | :---------: | :-----------: |
|-h | --help| show this help message and exit |
|-ssid SSID| --ssid SSID| Select the ssid for the spawn rogue AP|
|-c CHANNEL| --channel CHANNEL| Select the channel number for the spawn rogue AP|
|-bI BEACON_INT| --beacon_int BEACON_INT| Define the beacon interval in milliseconds for the spawn rogue AP|
|-i INTERFACE| --interface INTERFACE| Select the interface for the spawn rogue AP. Example: -i wlan0|
|-pK WPA_PASSPHRASE| --wpa_passphrase WPA_PASSPHRASE| Define the password for the spawn rogue AP.|
|-kA|| Enabling the KARMA attack|
|-dV|--debug-verbose| Enabling the verbose debug log|
|-K|--key_data|Include key data in debug messages|
|-t|--timestamp|Include timestamps in some debug messages|
|-v|--version|Show hostapd version|