PiKarma – Detects wireless network attacks performed by KARMA module (fake AP) and starts de-authentication attack for fake access points
Working Principle:
- Collects all the packets from Wireless Network. (Probe Response)
- Analyses all the packets in real time.
- If PiKarma finds more than one SSID info from unique mac address in Probe Response.
- Logs the activity with some extra information within defined template and sends de-authentication packets
How works KARMA Attack?
- Sends Probe Response for all Probe Requests
Example:
Softwares and hardwares that uses KARMA module
- FruityWifi
- WiFi Pineapple
- Mana (improvements to KARMA attacks)
Demo Video:
Usage
Requirements:
Hardware: TP LINK TL-WN722N or Dhttp://www.pir8geek.com/wp-admin/edit.php?post_type=pageark RangeMax wifi card
Modules: scapy, time, termcolor, argparse, netifaces, logging
Kali Linux:
Download PiKarma:
git clone https://github.com/WiPi-Hunter/PiKarma.git </pre. Install Python librarie(s):
pip install termcolor
It’s done!
Run the program with following command:
Monitor mode:
airmon-ng start interface(wlan0,wlan1) (Monitor mode) or ifconfig wlan0 down iwconfig wlan0 mode Monitor ifconfig wlan0 up
Run:
cd PiKarma python PiKarma.py -h