Saturday, 7 December 2024
Pentesting Tools Wireless Attacks Wireless Network

PiKarma – Detects Wireless Network Attacks

PiKarma – Detects wireless network attacks performed by KARMA module (fake AP) and starts de-authentication attack for fake access points

Working Principle:

  • Collects all the packets from Wireless Network. (Probe Response)
  • Analyses all the packets in real time.
  • If PiKarma finds more than one SSID info from unique mac address in Probe Response.
  • Logs the activity with some extra information within defined template and sends de-authentication packets

How works KARMA Attack?

  • Sends Probe Response for all Probe Requests

Example:

 

Softwares and hardwares that uses KARMA module

  • FruityWifi
  • WiFi Pineapple
  • Mana (improvements to KARMA attacks)

Demo Video:

Usage

Requirements:
Hardware: TP LINK TL-WN722N or Dhttp://www.pir8geek.com/wp-admin/edit.php?post_type=pageark RangeMax wifi card
Modules: scapy, time, termcolor, argparse, netifaces, logging
Kali Linux:
Download PiKarma:

git clone https://github.com/WiPi-Hunter/PiKarma.git
</pre.

Install Python librarie(s):
pip install termcolor

It’s done!

Run the program with following command:

Monitor mode:

airmon-ng start interface(wlan0,wlan1) (Monitor mode)

or 

ifconfig wlan0 down
iwconfig wlan0 mode Monitor
ifconfig wlan0 up

Run:

cd PiKarma
python PiKarma.py -h

Post Comment