Wireless Attacksfreeradiuswirelesseappeapttlsmschapradius

FreeRadius Wireless Pawn Edition

FreeRadius Wireless Pawn Edition is a modified FreeRadius server for capturing credentials in wireless networks. It supports specific EAP types for authentication attacks.

Description

freeradius-wpe is a specialized package of FreeRadius designed for wireless penetration testing, known as Wireless Pawn Edition. It facilitates the interception and capture of credentials during EAP-based authentication in wireless environments. The tool is tailored for scenarios where testers need to perform rogue RADIUS server operations to harvest usernames, passwords, or OTPs from clients attempting to connect to enterprise Wi-Fi networks.

Supported EAP types include PEAP/PAP (with OTP), PEAP/MSCHAPv2, EAP-TTLS/PAP (including OTPs), EAP-TTLS/MSCHAPv1, EAP-TTLS/MSCHAPv2, and EAP-MD5. These methods cover common inner authentication protocols used in WPA2-Enterprise setups, allowing the tool to emulate legitimate RADIUS servers effectively.

Use cases involve setting up a fake access point paired with this RADIUS server to trick clients into revealing credentials. It requires dependencies like libpcap for packet capture and various libraries for cryptographic and authentication handling.

How It Works

freeradius-wpe operates as a RADIUS server modified for wireless pawn edition, listening for EAP authentication requests from wireless clients. It emulates supported EAP types such as PEAP, TTLS, and MD5, handling inner authentication methods like PAP, MSCHAPv1/v2 to capture plaintext credentials or hashes during the handshake process. Configuration is checked with -C, and it runs in foreground mode (-f) for logging captured data to a specified file (-l), binding to specific IP/port (-i, -p) for targeted interception.

Installation

bash
sudo apt install freeradius-wpe

Flags

-CCheck configuration and exit.
-fRun as a foreground process, not a daemon.
-hPrint this help message.
-i <ipaddr>Listen on ipaddr ONLY.
-l <log_file>Logging output will be written to this file.
-mOn SIGINT or SIGQUIT clean up all used memory instead of just exiting.
-n <name>Read raddb/name.conf instead of raddb/radiusd.conf.
-p <port>Listen on port ONLY.

Examples

Prints the help message showing all available options.
freeradius-wpe -h
Checks the configuration and exits without starting the server.
freeradius-wpe -C
Runs the server as a foreground process instead of daemonizing.
freeradius-wpe -f
Listens only on the specified IP address.
freeradius-wpe -i 192.168.1.100
Writes logging output to the specified log file.
freeradius-wpe -l /tmp/radius.log
Listens only on the specified port.
freeradius-wpe -p 1812
Runs in foreground, logs to capture.log, and listens on all interfaces.
freeradius-wpe -f -l capture.log -i 0.0.0.0
Updated 2026-04-16kali.org ↗