Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- PiKarma - Detects wireless network attacks performed by KARMA module (fake AP)
- Screenshots
- Working Principle for PiKarma
- * Collects all the packets from Wireless Network. (Probe Response)
- * Analyses all the packets in real time.
- * If PiKarma finds more than one SSID info from unique mac address in Probe Response;
- * Logs the activity with some extra information within defined template and sends deauthentication packets
- How works KARMA Attack?
- Sends Probe Response for all Probe Requests
- Example:
- Softwares and hardwares that uses KARMA module
- * FruityWifi
- * WiFi Pineapple
- * Mana (improvements to KARMA attacks)
- * ...
- Soon to be added features
- * New techniques for detect KARMA and MANA attacks
- * Logging SSID information used in KARMA and MANA attack
- DEMO: https://www.youtube.com/playlist?list=PLwHi7Vsh6TpNrCX87KRzO9WVtHmqqC2aB
- Requirements
- * Hardware: TP LINK TL-WN722N or Dark RangeMax wifi card
- * Modules: scapy, time, termcolor, argparse, netifaces, logging
- Install: GitHackTools recommends that you should install PiKarma on Pentest OS like Kali Linux or Parrot Security OS
- git clone https://github.com/WiPi-Hunter/PiKarma
- sudo pip install termcolor
- cd PiKarma
- python PiKarma.py -h (PiKarma help menu)
- Monitor mode:
- airmon-ng start interface(wlan0,wlan1) (Monitor mode)
- or
- ifconfig wlan0 down
- iwconfig wlan0 mode Monitor
- ifconfig wlan0 up
- Download PiKarma: https://github.com/WiPi-Hunter/PiKarma
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement