Humans are the best resource and end-point of security vulnerabilities ever. Social Engineering is a kind of attack targeting human behavior by manipulating and playing with their trust, with the aim to gain confidential information, such as banking account, social media, email, even access to target computer. No system is safe, because the system is made by humans.The most common attack vector using social engineering attacks is spread phishing through email spamming. They target a victim who has a financial account such as banking or credit card information.
Social engineering attacks are not breaking into a system directly, instead it is using human social interaction and the attacker is dealing with the victim directly.
Do you remember Kevin Mitnick? The Social Engineering legend of the old era. In most of his attack methods, he used to trick victims into believing that he holds the system authority. You might have seen his Social Engineering Attack demo video on YouTube. Look at it!
In this post i am going to show you the simple scenario of how to implement Social Engineering Attack in daily life. It is so easy, just follow along the tutorial carefully. I will explain the scenario clearly.
Social Engineering Attack to gain email access
Goal: Gaining email credential account information
Target: My friend. (Really? yes)
Device: Computer or laptop running Kali Linux. And my mobile phone!
Environment: Office (at work)
Tool: Social Engineering Toolkit (SET)
So, based on the scenario above you can imagine that we don’t even need the victim’s device, i used my laptop and my phone. I only need his head and trust, and stupidity too! Because, you know, human stupidity can not be patched, seriously!
In this case we first are going to setup phishing Gmail Account login page in my Kali Linux, and use my phone to be a trigger device. Why i used my phone? I will explain below, later.
Fortunately we are not gonna install any tools, our Kali Linux machine has pre-installed SET (Social Engineering Toolkit), That’s all we need. Oh yeah, if you don’t know what is SET is, i will give you the background on this toolkit.
Alright that was enough let’s do the practice. Before we conduct the social engineering attack, we need to set up our phising page first. Here, i am sitting down on my desk, my computer (running Kali Linux) is connected to the internet the same Wi-Fi network as my mobile phone (i am using android).
STEP 1. SETUP PHISING PAGE
Setoolkit is using Command Line interface, so don’t expect ‘clicky-clicky’ of things here. Open up terminal and type:~# setoolkit
You will see the welcome page at the top and the attack options at the bottom, you should see something like this.
Yes, of course, we are going to perform Social Engineering Attacks, so choose number 1 and hit ENTER.
And then you will be displayed the next options, and choose number 2. Website Attack Vectors. Hit ENTER.
Next, we choose number 3. Credential Harvester Attack Method. Hit Enter.
Further options are narrower, SET has pre-formatted phising page of popular websites, such Google, Yahoo, Twitter and Facebook. Now choose number 1. Web Templates.
Because, my Kali Linux PC and my mobile phone were in the same Wi-Fi network, so just input the attacker (my PC) local IP address. And hit ENTER.
PS: To check your device IP address, type: ‘ifconfig’
Alright so far, we have set our method and the listener IP address. In this options listed pre-defined web phising templates as i mentioned above. Because we aimed Google account page, so we choose number 2. Google. Hit ENTER.
Now, SET starts my Kali Linux Webserver on port 80, with the fake Google account login page. Our setup is done. Now i am ready walking into my friends room to login into this phishing page using my mobile phone.
STEP 2. HUNTING VICTIMS
The reason why i am using mobile phone (android)? Let see how the page displayed in my built-in android browser. So, i am accessing my Kali Linux webserver on 192.168.43.99 in the browser. And here is the page:
See? It looks so real, there are no security issues displayed on it. The URL bar showing the title instead the URL itself. We know the stupid will recognize this as the original Google page.
So, i bring my mobile phone, and walk into my friend, and talk to him as if i failed to login to Google and act if I am wondering if Google crashed or errored. I give my phone and ask him to try to login using his account. He doesn’t believe my words and immediately begins typing in his account information as if nothing will happen badly here. Haha.
He already typed all the required forms, and let me to click the Sign in button. I click the button… Now It is loading… And then we got Google search engine main page like this.
PS: Once the victim clicks the Sign in button, it will send the authentication information to our listener machine, and it is logged.
Nothing is happening, i tell him, the Sign In button is still there, you failed to login though. And then i am opening again the phising page, while another friend of this stupid coming to us. Nah, we got another victim.
Until i cut the talk, then i go back to my desk and check the log of my SET. And here we got,
Goccha… I pwnd you!!!
I am not good at story telling (thats the point), to sum up the attack so far the steps are:
Router gateways are responsible for protecting every aspect of a network’s configuration. With unfettered access to these privileged configurations, an attacker on a compromised Wi-Fi network can perform a wide variety of advanced attacks.
With access to the router’s gateway and complete control over the configurations, a hacker in this position of power can perform a variety of attacks. They could do any of the following, and then some.
perform DNS poisoning attacks
modify or manipulate forwarding ports
reset the gateway password
reset the Wi-Fi name and password
install a malicious firmware
modify or delete login and system logs
modify or disable the firewall
Patator, like Hydra and Medusa, is a command-line brute-forcing tool. The developers have tried to make it more reliable and flexible than its predecessors. My favorite feature of Patator is the raw_request module that allows penetration testers to brute-force HTTP logins much like Burp’s Intruder module.
A General Outline for an Attack
To demonstrate, I’m going to show how to use Patator against two popular consumer routers found on Amazon. Not all router gateways handle authentication the same. I’ll show a kind of general procedure to follow when performing such attacks.
Capture a login request: A single login attempt is captured in Burp to analyze the request.
Identify the parameters: It’s important to identify where the dynamic parameters (i.e., username and password) are stored in the request as some login forms handle authentication differently.
Modify and save the request: After the parameters have been identified, insert a placeholder into the request to help Patator iterate through the desired wordlist.
Generate a targeted wordlist: A targeted wordlist containing 10,000 passwords is usually more effective than a wordlist of 10 million random passwords. Some authentication methods involve hashing or encoding the credentials in the client’s browser before making the request. The wordlist will need to reflect this as needed.
Identity and filter failed requests: With modern routers, very rarely will a successful login attempt makes itself known. Understanding and filtering HTTP status codes play a big part in identifying the difference between a failed and successful login attempt.
Now, a word of caution: Patator isn’t very beginner-friendly, so there’s a bit of a learning curve with the syntax that can take some getting used to. Before proceeding, you should have a general understanding of HTTP requests, HTTP status codes, and some experience with Burp’s Intruder module.
Install Patator in Kali Linux
Use the following apt-get command to install Patator in Kali.
~# apt-get update && apt-get install patator
Reading package lists... Done
Building dependency tree
Reading state information... Done
The following NEW packages will be installed:
ca-certificates-java default-jre default-jre-headless fonts-dejavu-extra freerdp2-x11 ike-scan java-common ldap-utils libatk-wrapper-java libatk-wrapper-java-jni libfreerdp-client2-2
libfreerdp2-2 libgif7 libwinpr2-2 openjdk-11-jre openjdk-11-jre-headless patator python3-ajpy python3-bcrypt python3-dnspython python3-ipy python3-mysqldb python3-nacl python3-openssl
python3-paramiko python3-psycopg2 unzip
0 upgraded, 27 newly installed, 0 to remove and 0 not upgraded.
Need to get 43.9 MB of archives.
After this operation, 192 MB of additional disk space will be used.
Do you want to continue? [Y/n]
When that’s done, use the –help option to verify Patator was successfully installed and view the available modules.
As stated, we’ll focus on the http_fuzz module, designed to brute-force HTTP logins as well as perform various types of web-based injection attacks (e.g., fuzzing). View the available http_fuzz options using the following command.
~# patator http_fuzz --help
Patator v0.7 (https://github.com/lanjelot/patator)
Usage: http_fuzz <module-options ...> [global-options ...]
http_fuzz url=http://10.0.0.1/FILE0 0=paths.txt -x ignore:code=404 -x ignore,retry:code=500
http_fuzz url=http://10.0.0.1/manager/html user_pass=COMBO00:COMBO01 0=combos.txt -x ignore:code=401
http_fuzz url=http://10.0.0.1/phpmyadmin/index.php method=POST body='pma_username=root&pma_password=FILE0&server=1&lang=en' 0=passwords.txt follow=1 accept_cookie=1 -x ignore:fgrep='Cannot log in to the MySQL server'
url : target url (scheme://host[:port]/path?query)
body : body data
header : use custom headers
method : method to use [GET|POST|HEAD|...]
raw_request : load request from file
scheme : scheme [http|https]
auto_urlencode: automatically perform URL-encoding [1|0]
user_pass : username and password for HTTP authentication (user:pass)
auth_type : type of HTTP authentication [basic | digest | ntlm]
follow : follow any Location redirect [0|1]
max_follow : redirection limit 
accept_cookie : save received cookies to issue them in future requests [0|1]
proxy : proxy to use (host:port)
proxy_type : proxy type [http|socks4|socks4a|socks5]
resolve : hostname to IP address resolution to use (hostname:IP)
ssl_cert : client SSL certificate file (cert+key in PEM format)
timeout_tcp : seconds to wait for a TCP handshake 
timeout : seconds to wait for a HTTP response 
before_urls : comma-separated URLs to query before the main request
before_header : use a custom header in the before_urls request
before_egrep : extract data from the before_urls response to place in the main request
after_urls : comma-separated URLs to query after the main request
max_mem : store no more than N bytes of request+response data in memory [-1 (unlimited)]
persistent : use persistent connections [1|0]
--version show program's version number and exit
-h, --help show this help message and exit
-x arg actions and conditions, see Syntax below
--start=N start from offset N in the wordlist product
--stop=N stop at offset N
--resume=r1[,rN]* resume previous run
-e arg encode everything between two tags, see Syntax below
-C str delimiter string in combo files (default is ':')
-X str delimiter string in conditions (default is ',')
failures cannot be ignored with -x (this is by design
to avoid false negatives) this option overrides this
--rate-limit=N wait N seconds between each test (default is 0)
--timeout=N wait N seconds for a response before retrying payload
(default is 0)
--max-retries=N skip payload after N retries (default is 4) (-1 for
-t N, --threads=N number of threads (default is 10)
-l DIR save output and response data into DIR
-L SFX automatically save into DIR/yyyy-mm-dd/hh:mm:ss_SFX
(DIR defaults to '/tmp/patator')
-d, --debug enable debug messages
actions := action[,action]*
action := "ignore" | "retry" | "free" | "quit" | "reset"
conditions := condition=value[,condition=value]*
condition := "code" | "size" | "time" | "mesg" | "fgrep" | "egrep" | "clen"
ignore : do not report
retry : try payload again
free : dismiss future similar payloads
quit : terminate execution now
reset : close current connection in order to reconnect next time
code : match status code
size : match size (N or N-M or N- or -N)
time : match time (N or N-M or N- or -N)
mesg : match message
fgrep : search for string in mesg
egrep : search for regex in mesg
clen : match Content-Length header (N or N-M or N- or -N)
For example, to ignore all redirects to the home page:
... -x ignore:code=302,fgrep='Location: /home.html'
tag := any unique string (eg. T@G or _@@_ or ...)
encoding := "hex" | "unhex" | "b64" | "md5" | "sha1" | "url"
hex : encode in hexadecimal
unhex : decode from hexadecimal
b64 : encode in base64
md5 : hash in md5
sha1 : hash in sha1
url : url encode
For example, to encode every password in base64:
... host=10.0.0.1 user=admin password=_@@_FILE0_@@_ -e _@@_:b64
Please read the README inside for more examples and usage information.
1Attacking the Medialink AC1200 Router
The first router being attacked is the Medialink AC1200. It’s currently one of Amazon’s top choices for consumer router’s and quite popular.
That tells us that the wordlist used when brute-forcing the gateway must be in MD5 format. With this particular router, at the gateway, there’s no available field for username input. We can see from the captured data that the „admin“ username is embedded into the request. So there’s only one dynamic parameter: the password.
Step 3Modify & Save the Raw Request
Change the hashed password parameter to „FILE0“ within the request. The modification will act as a placeholder in the request that indicates to Patator where to insert the passwords. (The reason for this will be clear in a later step.)
When that’s done, right-click inside the Burp window and select the „Copy to file“ option. Save it to the /tmp directory with the „router_request.txt“ filename.
Step 4Generate a Targeted Wordlist
As we discovered previously, passwords are hashed in the browser before being sent to the router. Patator has a built-in feature to hash passwords, but let’s take this opportunity to learn some Bash password manipulation tricks.
First, download a preferred wordlist. Any generic wordlist will do fine for testing purposes. Use the below wget command to download my wordlist generated by analyzing leaked databases.
With the router_request.txt and the wordlist of hashed passwords, the router’s gateway can be brute-forced with the following Patator command. To stop the brute-force attack at any time, press Control-C on the keyboard.
Hypertext Transfer Protocol (HTTP) status codes, also known as response codes, are issued by web servers to our web browser when we make requests. These codes are a way for web servers to communicate errors to syadmins, web developers, and end-users alike.
Sometimes the 200 („200 OK“) status code is an indication that the server accepted the provided password. In this case, every single login attempt is producing the „200 OK“ response — so it’s actually helping to identify what a failed login attempt looks like.
The „size“ column can also be extremely helpful. It will display the size (in bytes) of the server’s response to the login attempt. It’s returning 20 bytes with every login attempt, so it’s probably safe to assume this byte size indicates a failed login attempt, in which case, it’s safe to omit responses of that size. We can do so by adding the -x ignore:size=20 option and argument.
Now, only one request is displayed, with a size of 3,962 bytes.
There are a few ways of unhashing a discovered password. The passwords in both wordlist.txt and md5_wordlist.txt appear in the same order. The only difference is that one wordlist is in plain text; the other is hashed.
Below, we’ll use nl to prepend a number to every line in the md5_wordlist.txt, then grep for the hash.
A router from the Netgear N300 series is next on the list of targets. It’s also one of Amazon’s top choices for entry-level, consumer Wi-Fi routers.
Step 1Capture a Login Request with Burp
We’ll follow the same procedure as before, starting with capturing the raw request. Navigate to the router’s gateway using a web browser configured to proxy through Burp. Enter the „admin“ and „password“ credentials when prompted.
Step 2Identify the Parameters
Notice this time there isn’t an obvious password= parameter like the Medialink AC1200 router.
The above string isn’t hashed with MD5. While it may appear encrypted or secured in some way, it’s using a simple base64 encoding. The string is decoded using the below command.
The username and password are concatenated into a single string and encoded. This authentication method is called basic HTTP authentication. It should only be used with HTTPS, as an attacker on the network can easily capture the credentials in transit.
Step 3Modify & Save the Raw Request
With the username and password parameters identified, the raw request is modified to include the Patator placeholder („FILE0“) and saved to a local file.
Right-click inside the window and select the „Copy to file“ option. Save it to the /tmp directory with the „router_request.txt“ filename.
Step 4Generate a Targeted Wordlist
Now that we know the kind of authentication parameter being used, a wordlist can be generated specific to the router. Again, Patator has a built-in feature to encode passwords, but string manipulation with Bash is a good skill to learn. It can be applied to other brute-forcing tools, for example.
The below Bash one-liner will use a while loop to iterate through the passwords in the wordlist. Each password will be concatenated into a single string with the username and password converted into base64. All of the encoded strings are appended to the /tmp/base64_wordlist.txt file.
~# while read password; do printf "admin:$password" | base64; done < /tmp/wordlist.txt >>/tmp/base64_wordlist.txt
The encoded passwords can be verified using the below head command to print the first ten lines of the file.
The router’s gateway can be brute-forced with Patator using the router_request.txt and base64_wordlist.txt files. Remember, while in progress, Patator can be stopped at any time by pressing Control-C on the keyboard.
HTTP status codes are split into several categories or „classes.“ The first digit defines the categories, and the following digits are subcategories specific to different types of error messages. For example, the 4xx categories are a class of errors specific to HTTP requests that cannot be fulfilled by the web server, like trying to view a webpage that doesn’t exist. That’s defined as a status „404 Not Found,“ probably one of the most well-known status codes on the internet.
We immediately notice a ton of 401 status codes in the Patator output, which are clear indications of a failed login requests. These are omitted from the output using the -x ignore:code=401 option and argument.
This time, we received only one request with the 200 status code. The size of the response is 622 bytes, more than that of a failed 401 response. It’s a good sign. The login credentials are decoded using the following command.
How to Protect Yourself from Router Gateway Attacks
Regularly updating the firmware will help prevent against exploits and Routersploit attacks. A strong (non-default) password will prevent brute-force attacks performed with Patator.
Update the firmware. Router manufacturers often issue bug and exploit patches. It’s important to keep the router firmware up to date and have it check for updates automatically if possible.
Disable remote administration. Some consumer routers allow for remote access by default. Without knowing it, hackers may find your router on Shodan and seize control of it.
WPA2 encryption. Only use WPA2 encryption. Weaker encryption options like WEP will leave the router extremely vulnerable to attackers.
Change default passwords. Never use the default credentials. In addition to the WPA2 pre-shared key, the admin portal (router gateway) should also be protected by a strong password. It’s the only defensive measure preventing an attacker from discovering default credentials and modifying sensitive settings.
Disable WPS. WPS is featured in most consumer routers and designed to make password-less authentication more convenient. Unfortunately, the feature is usually enabled by default and easily exploited by hackers.
Be persistent. Change your Wi-Fi password every few months. It’s a pain to update the Wi-Fi password for every device on the network, but this tactic will keep hackers guessing — literally. If a hacker has captured the WPA2 handshake and spends several weeks trying to crack the password, changing it will render the captured handshake useless.
Unfortunately, none of the routers I tested support HTTPS when authenticating the admin settings. So an attacker on the network inspecting traffic will be able to passively discover the login password — even if it’s a totally random 42-character password.
The price of hacking Wi-Fi has fallen dramatically, and low-cost microcontrollers are increasingly being turned into cheap yet powerful hacking tools. One of the most popular is the ESP8266, an Arduino-programmable chip on which the Wi-Fi Deauther project is based. On this inexpensive board, a hacker can create fake networks, clone real ones, or disable all Wi-Fi in an area from a slick web interface.
The Rise of Microcontrollers as Offense Wi-Fi Tools
Wi-Fi hacking has usually relied on a couple of pieces of hardware to do the trick. First, you’d need a computer capable of running whatever attack program you’re trying to use. Second, you’d need a wireless network adapter with a chipset that supports whatever bad Wi-Fi thing you’re trying to do. Things could get expensive, with the cheapest combination of a Raspberry Pi and a wireless network adapter still coming in at around $70 to get started.
For a lot less, microcontrollers are capable of many of the same attacks the larger and more expensive Raspberry Pi can do. While a microcontroller isn’t capable of running a full operating system like Kali Linux, they are often easier to run due to the simple way in which they are programmed. It’s made even more simple by the fact that these microcontrollers can be programmed in the popular Arduino IDE, allowing projects to be easily shared.
While Wi-Fi-enabled microcontrollers like the ESP8266 do not officially support attacking Wi-Fi networks, and old SDK allows a hacker to build packets manually, thus being able to emulate many kinds of useful packets. That led CS student and chicken-in-space Stefan „Spacehuhn“ Kremser to create the Wi-Fi Deauther, a program for the ESP8266 capable of several powerful Wi-Fi attacks.
The ESP8266 Deauther Program
The most useful packets the Wi-Fi Deauther can create are deauthentication and disassociation packets. These packets are often abused because they are unauthenticated, meaning anyone on a network can send them to anyone else while pretending the messages are coming from the router. When a device on the Wi-Fi network receives the packet, it immediately disconnects from the network. The Wi-Fi Deauther does this over and over, spamming connected devices with „disconnect“ messages. It results in a „jamming“ effect on the network as devices cannot connect fast enough to avoid being instantly kicked off.
That’s not the only trick the Deauther program has up its sleeve. It’s also capable of scanning for both nearby access points and connected devices, and cloning any Wi-Fi network it sees. It can also generate dozens of fake Wi-Fi networks with any names you want, monitor channels for packet traffic between devices, and do all of this from a fancy built-in web interface similar to a Wi-Fi Pineapple.
While the cheapest boards are a good start, they lack a few things that make the Deauther a lot more useful. The most simple, cheap boards have no screen, no buttons or controls, and no indicators to know what’s going on just by looking at the device. To control it, you’d need to log in to the web interface or buy and attach the hardware yourself.
The ESP8266 Deauther Board
Fortunately, Spacehuhn partnered with a board producer to create a custom ESP8266-based development board for security projects. This version of the ESP8266 features options that can be explored through a (somewhat fragile) selector switch that scrolls through menu options on an OLED display. The board allows any external antenna to be mounted on it, features an RGB LED for showing what mode the device is in, and connects either to a LiPo battery or USB power source directly.
Upon powering up the custom board, it’s easy to scroll through the options to operate the board by hand. It’s is a leg up on even the Raspberry Pi, which tells you almost nothing just by plugging it in without a screen. With only a battery pack, you can power the Deauther board, select a target, and launch an attack without the need for a viewing or controlling device, as is often the case with devices like the Pi Zero W.
Due to reliability issues with cheap suppliers and the numerous hardware benefits the official board offers, I highly recommend the official DSTIKE version for anyone wanting to try this project, which costs $12. There are some copycat versions available on Amazon, but they usually cost more and, again, could come from cheap suppliers. Also, while it’s possible to do this with a cheap NodeMCU, you’ll need a second device to log in and control the device.
What You’ll Need
To get started with the Wi-Fi Deauther project, you’ll need an ESP8266-based development board. The best way to follow the project and stay involved with updates to the software is to purchase the original board design on Tindie. This project should work with the following Spacehuhn-designed boards.
While all of these boards are unique and come with different hardware, all are based on the ESP8266, and any will work with the Wi-Fi Deauther program. Also, buying them supports the researcher behind the program, and it gives you access to extended hardware features that make the board more useful without needing a second device to control it.
While there are rip-offs of the designs available for less or even more, they often don’t use the same hardware or use cheaper manufacturing techniques, leading to frustrating failures that add up over time.
If you’re on a budget and don’t mind using a device without a screen, you can do this project for cheap with either of the following boards. You can read more about the kinds of boards that will work for this project on Spacehuhn’s GitHub page.
Aside from the board, you’ll need a computer or smartphone with Wi-Fi to join the network that the board creates. You’ll need a Micro-USB cable to supply power, and a power source like a battery to plug it in to. Once you have a computer or smartphone to control the Deauther, with Micro-USB cable and power source, as well as a network you have permission to test out the Deauther on, you’re ready to begin.
Step 1Get Your Board Ready
If you have the original board, it should come preloaded with the latest Wi-Fi Deauther program. You should be able to power on the board by plugging it into a USB power source and using the screen and selector switch to scroll through the menu options directly. Be careful with the selector switch, though, as it has a tendency to become unsoldered from the board and requires some basic knowledge of soldering to reattach.
Skip to Step 2 if you’re using the original Deauther board. If not, you’ll need to take a few steps to get set up. First, download and install the Arduino IDE. Once you’ve done that, you’ll need to click on the „Arduino“ or „File“ drop-down menu, then select „Preferences“ from the menu that appears. Next, click the dual-window icon next to the Additional Boards Manager URLs field, then paste the following URLs, one each to a line. Once that’s complete, click „OK“ to save, then „OK“ again to close the menu.
Next, you’ll need to add the board you’re using to the Boards Manager. To do this, you’ll need to click on „Tools,“ then hover over the „Board“ section to see the drop-down list of supported boards. At the top, click „Boards Manager“ to open the window that will allow us to add more boards.
When the Boards Manager window opens, type „esp8266“ into the search bar. Select and install both „arduino-esp8266-deauther“ and „esp8266“ to add support for the board to your Arduino IDE.
Once that is done, you should be ready to program your board. Plug your ESP8266-based board into your computer. When you click on „Tools,“ you should see the correct port auto-selected, but if not, click on the „Board“ option and select the correct one under the Deauther Modules section.
If you’re using a bad cable, the port may not show up, so if you don’t see anything after you’ve completed the other steps, try another cable first. If you still don’t see anything, there’s a good chance you need to install a driver by following these instructions, which is common when using cheap knockoff boards.
Now, let’s download the code onto the ESP8266-based Deauther board. Clone the repository with the command below, and then move the „esp8266_deauther“ folder into your „Arduino“ folder.
When it’s done downloading, open the „esp8266_deauther.ino“ file with Arduino from inside the „Arduino“ folder. Check your upload settings to make sure your board is properly selected, and press upload to send the program to the ESP8266 device!
Step 2Look for the Control Access Point
Once your Wi-Fi Deauther board is powered, you shouldn’t need a screen to interact with it. While it’s convenient to have a display to see what’s going on, we can rely on the web interface to control the ESP8266 device as well.
These chips are amazing because they can be put into many Wi-Fi modes, with the ability to join or even become their own Wi-Fi network. If you look on a smartphone or computer, you should see a Wi-Fi network nearby named „pwned.“ This is a network being created by our Deauther board!
To access it, connect to the Wi-Fi network and enter the password „deauther“ to join. Then, in a browser window, you can navigate to the default IP address of 192.168.4.1 or simply type deauth.me to access the web interface the Deauther board is creating.
Now, agree to the notice that appears advising you not to do anything bad with this project. Once you agree, you’ll have access to the control interface for the device.
Step 3Perform a Scan of the Area
First, let’s take a scan of the area around us. The first page you’ll find yourself on is the „Scan“ page, which breaks down results into a few easy to understand categories. First, there are access points. This will give you a list of every device advertising a Wi-fi network in range.
Further down the list, you’ll see devices that are connected to a network, as well as which network they are connected to. You can select the „Add“ button to save a particular device or network to your target list. Here, we’ll select „spot 2.4 ghz“ as the network we want to target.
Once you’ve selected a network to target, we can move on to the „SSIDs“ menu by clicking on the menu shortcut in the top left of the screen.
Step 4Select Target Networks
In the „SSIDs“ section, we’ll be able to clone networks, create fake networks, or simply Rickroll everyone.
The top field is for specifying any fake network we want to create. This includes the SSID, or network name, whether or not the network uses WPA security, and how many networks you want to create.
If you selected an access point before, you can click „Clone Selected APs“ to generate clones of the targeted network. There is also a module to generate random SSIDs, including several that are just the lines to „Never Gonna Give You Up.“
In the image below, we cloned the network many times, making it very hard to find the correct network.
Step 5Launch an Attack
Now, let’s check out the attacks we can launch in the „Attacks“ section of the menu. Here, we can see three primary kinds of attacks.
Deauth: This will attack any network in range, disconnecting it from Wi-Fi until you disable it. It’s worth mentioning that you are connected to the device via Wi-Fi, and this makes it likely that you may unintentionally prevent yourself from connecting to the device to turn it off. If you find yourself disconnected and you can’t get back in, you may need to unplug the board to get it to stop.
Beacon: This attack will create up to a thousand fake networks, either cloning nearby networks or creating entirely fake ones from scratch.
Probe: Here, the board will send probe requests asking for a network name that’s in the list you specify. This will confuse some Wi-Fi trackers and also sometimes cause Wi-Fi attack tools to create fake networks in response to the network names contained in the probe requests.
To begin the deauthentication attack, make sure you are somewhere where the only networks that are in range are ones you have permission to attack. Once you are, click the „Start“ button next to the „Deauth“ attack. When you feel the Wi-Fi devices in your local area have had enough punishment, click „Stop“ to end the attack.
The original Wi-Fi Deauther board also comes with the ability to add an external antenna. By doing so, it’s possible to extend or change the range of the device by adding a directional antenna.
Step 6Customize Your Settings
Now that we’ve explored the main attacks, we can also configure the board via the „Settings“ tab on the top left of the screen. Clicking on it will bring up a menu page allowing you to do things like change the name of the network used to communicate with the board, change the password, and change the channel the device broadcasts its network on.
Here, you’ll also find an option to create a „Hidden“ network, which might seem more stealthy to connect to. In fact, any device you connect to a hidden network will start calling out that network name any time the Wi-Fi is left on, making your phone more trackable.
The reasons devices that have connected to a hidden network always call for them is because they know the station is not broadcasting its network name, so it’s up to your device to always be asking if it is nearby.
You can customize settings as much as you like here, but be careful not to disable the Wi-Fi portal and the serial connection at the same time. Doing so will leave you with no way to communicate with the board, so make sure you leave at least one enabled to allow you to get back in.
Once you update your password and the name of your command-and-control Wi-Fi network, you’re ready to use the Wi-Fi Deauther anywhere, from any device. After making any changes to the menu or any other settings, make sure to press „Save“ and „Reload“ to apply the changes you made.
Microcontrollers Are Cheap, Efficient Cyber Weapons
The Raspberry Pi was revolutionary in giving access to powerful hacking tools to anyone who can afford a $35 board. With the Wi-Fi Deauther board, the boundaries of what can be done with low-cost Wi-Fi hardware has been pushed even further than before.
While microcontrollers don’t offer a full operating system to work with like a Raspberry Pi, the powerful attacks they’re capable of on their own make them more than worth checking out. While the Wi-Fi Deauther board can’t capture the numerous WPA handshakes it generates from nearby networks while in operation by itself, it’s a perfect companion tool for capturing WPA handshakes in Kali for later cracking.
I hope you enjoyed this guide to the Wi-Fi Deauther project! If you have any questions about this tutorial on the Wi-Fi Deauther board, leave a comment below, and feel free to reach me on Twitter @KodyKinzie.
Mikrofone und Kameras können an allen möglichen Orten versteckt werden, um ahnungslose Menschen auszuspionieren. An den meisten Orten ist es illegal, dass dich jemand ohne entsprechende Information aufnimmt, aber dies bedeutet nicht immer, dass du nicht aufgenommen wirst. Wenn du das Gefühl hast, dass du aufgenommen wirst, führe eine gründliche physische Suche durch und setze die dir verfügbare Technik ein, um versteckte Kameras und Mikrofone zu entdecken.