Cupid-WPA
Cupid-WPA is a set of forked wireless tools patched to exploit the Hertbleed vulnerability over EAP-TLS tunneled protocols in wireless networks. It includes modified hostapd and wpa_supplicant binaries for setting up rogue APs or attacking legitimate ones.
Description
Cupid-WPA provides cupid-hostapd, a fork of hostapd, to create fake wireless networks that exploit the Heartbleed vulnerability in terminals attempting to connect via EAP-PEAP, EAP-TLS, or EAP-TTLS protocols. This allows extraction of sensitive information from vulnerable clients.
The companion cupid-wpasupplicant fork enables attacks against wireless access points by exploiting the same vulnerability when connecting as a client. Additional utilities like cupid-hostapd_cli, cupid-wpa_cli, cupid-wpa_passphrase, and cupid-wpa_supplicant support configuration, management, and PSK generation for WPA networks.
Use cases include penetration testing wireless networks vulnerable to Hertbleed, demonstrating risks in EAP-TLS implementations. See the presentation slides for an introduction: http://www.slideshare.net/lgrangeia.
How It Works
The tools use patched versions of hostapd v2.1 and wpa_supplicant v2.1 with libunsafessl1.0.2, incorporating an unsafe OpenSSL variant vulnerable to Heartbleed (CVE-2014-0160 variant for Hertbleed). Cupid-hostapd sets up an IEEE 802.11 AP with 802.1X/WPA/WPA2/EAP/RADIUS authentication, triggering Heartbleed during TLS handshakes in EAP-PEAP, EAP-TLS, or EAP-TTLS tunnels to leak memory contents from connecting clients. Cupid-wpasupplicant reverses this, acting as a client to exploit vulnerable APs during authentication.
Installation
sudo apt install cupid-hostapdFlags
Examples
cupid-hostapd --helpcupid-hostapd_cli -hcupid-wpa_cli -hwpa_supplicant -Dnl80211 -iwlan0 -c/etc/wpa_supplicant.confcupid-wpa_passphrase [ ssid ] [ passphrase ]cupid-hostapd <configuration file(s)>cupid-wpa_supplicant -BddhKLqqstuvW -i<ifname> -c<config file>