Skip to content

An evil twin attack is a spoofing cyberattack that works by tricking users into connecting to a fake Wi-Fi access point that mimics a legitimate network. Once a user is connected to an “evil twin” network, hackers can access everything from their network traffic to private login credentials

Notifications You must be signed in to change notification settings

matannagar/Evil-Twin-Attack

Repository files navigation

Evil Twin Attack

An evil twin attack is a spoofing cyberattack that works by tricking users into connecting to a fake
Wi-Fi access point that mimics a legitimate network.
Once a user is connected to an “evil twin” network, hackers can access everything from their network traffic to private login credentials.

Description

The Evil Twin Attack conssists of three seperate projects:

  1. Deauthentication Attack - A tool that disconnects a given client from the current Wi-Fi he is logged to
  2. Fake Access Point Attack - Creating a fake non protected wireless AP, similar to the one we chose to attack.
    Here the client will log into the second Wi-Fi and when trying to navigate the web, immediately he'll be directed into a fake Login page, requiring him to insert his password to gain internet access.
  3. Protecting tool - This tool will detect packet anomalies in your monitor card and alert the user he is being attacked.

*This project requires an external monitor card

Getting Started

Dependencies

  • Lubuntu 21.04
  • Python 3.9.7

Installing

Open terminal and run the following commands:

  • Create a virtual environment in the projects folder
  • pip install -r /path/to/requirements.txt
  • sudo bash install.sh
  • follow the to-do.txt file command

Executing program

  • sudo python3 main.py

Help

Any advise for common problems or issues.

command to run if program contains helper info

About

An evil twin attack is a spoofing cyberattack that works by tricking users into connecting to a fake Wi-Fi access point that mimics a legitimate network. Once a user is connected to an “evil twin” network, hackers can access everything from their network traffic to private login credentials

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published