Wireless Attackswifiphishingsocial-engineeringrogue-apdeauthenticationcredentials

Wifiphisher

Automated phishing attacks against Wi-Fi networks to obtain secret passphrases or other credentials without brute forcing. It uses social engineering to trick users into entering WPA/WPA2 passphrases via fake captive portals or firmware upgrade pages.

Description

Wifiphisher is a security tool that mounts automated phishing attacks against Wi-Fi networks. It creates rogue access points and presents fake webpages, such as firmware upgrades or captive portals, to capture credentials from connected clients. Unlike brute force methods, it relies on social engineering to obtain WPA/WPA2 secret passphrases or third-party login credentials.

Use cases include testing Wi-Fi network security by simulating real-world phishing scenarios. It deploys a fake access point mimicking legitimate networks, luring clients to connect and disclose sensitive information through phishing templates.

The tool supports monitor and AP modes on wireless interfaces, DHCP leasing, and HTTP request logging for captured data. It is particularly effective against users connecting to 'Free Wi-Fi' style hotspots expecting seamless access.

How It Works

Wifiphisher selects a wireless interface supporting AP and monitor modes to create a rogue access point with a specified ESSID. It starts DHCP services, configures iptables, and optionally avoids jamming (-nJ). Phishing scenarios like firmware-upgrade (-T) serve webpages prompting for network PSK. Client connections trigger HTTP requests and POST submissions of credentials, logged alongside DHCP leases and deauth activities.

Installation

bash
sudo apt install wifiphisher

Flags

-nJDo not perform jamming
-eCreate a wireless access point with specified ESSID (e.g. -e “Free Wi-Fi”)
-TPresent a fake firmware upgrade to clients (e.g. -T firmware-upgrade)
-iManually choose an interface that supports both AP and monitor modes (e.g. -i wlan1)
-eIManually choose an interface that supports monitor mode for extensions
-hShow help message and exit

Examples

Do not perform jamming, create a wireless access point named 'Free Wi-Fi' and present a fake firmware upgrade page to clients to capture PSK
wifiphisher -nJ -e "Free Wi-Fi" -T firmware-upgrade
Show the help message and usage options
wifiphisher -h
Manually select wlan1 interface for rogue AP and extensions like deauth attacks
wifiphisher -i wlan1
Select wlan0 interface to create the rogue access point as shown in the output log
wifiphisher -i wlan0
Manually choose a specific interface supporting AP and monitor modes
wifiphisher --interface INTERFACE
Manually choose an extensions interface that supports monitor mode
wifiphisher -eI EXTENSIONSINTERFACE
Updated 2026-04-16kali.org ↗