EAPHammer
Toolkit for targeted evil twin attacks against WPA2-Enterprise networks. Designed for full scope wireless assessments and red team engagements with minimal manual configuration.
Description
EAPHammer is a specialized toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. It provides an easy-to-use interface that enables powerful wireless attacks with minimal manual configuration, making it ideal for comprehensive wireless assessments and red team operations. The tool supports credential stealing attacks against WPA/2-EAP networks through just a few commands, as demonstrated in its Quick Start section.
Key features include a certificate wizard for managing authentication certificates, support for various authentication modes (open, WPA-PSK, WPA-EAP, OWE), karma attacks, and captive portal deployments. It integrates with tools like hostapd, dnsmasq, and responder to create convincing rogue access points that capture credentials and handshakes.
The toolkit emphasizes speed and usability, with options for autocracking captured credentials, EAP password spraying, and customizable portal templates for social engineering attacks.
How It Works
EAPHammer creates rogue access points mimicking legitimate WPA2-Enterprise networks using hostapd and supporting services like dnsmasq for DHCP and a web server for captive portals. It captures authentication attempts, EAP credentials, PMKIDs, and WPA handshakes through evil twin deauthentication attacks and karma functionality that responds to probe requests. The certificate wizard generates or imports enterprise-grade certificates for realistic WPA-EAP impersonation. Captured data can be automatically cracked using hashcat integration or sent to remote cracking rigs. Additional techniques include hostile portals, EAP spraying across user lists, and customizable phishing templates.
Installation
sudo apt install eaphammerFlags
Examples
eaphammer -heaphammer --cert-wizardeaphammer --cert-wizard createeaphammer --cert-wizard listeaphammer --creds -i wlan0 -e "TargetCorp WiFi" --lhost 192.168.1.100eaphammer --pmkid -i wlan0 -e "Target WiFi" -c 6eaphammer --eap-spray -I wlan0 wlan1 --user-list users.txt --password Summer2024!eaphammer --captive-portal -i wlan0 --essid "Free WiFi" --lhost 10.0.0.1 --portal-template mytemplate