Open In App

WIFIPhisher Kali Linux Tools

Last Updated : 17 Jan, 2024
Improve
Improve
Like Article
Like
Save
Share
Report

Wifiphisher is a security tool designed for penetration testing. It is not intended for malicious purposes, but rather for ethical hacking, security assessments, and educational use by security professionals. The primary goal of Wifiphisher is to perform social engineering attacks against Wi-Fi networks to test their security. Wifiphisher is a rogue Access Point framework for red team operations or Wi-Fi security testing. Penetration testers can easily achieve a man-in-the-middle position against wireless clients using Wifiphisher by performing targeted Wi-Fi association attacks. Wifiphisher can launch victim-specific online phishing attacks against connected clients to steal credentials (e.g., from third-party login sites or WPA/WPA2 Pre-Shared Keys) or infect victim stations with malware.

Features of WifiPhisher Tool:

  1. Access Point Impersonation: Wifiphisher creates a rogue wireless access point that impersonates a real Wi-Fi network. The attacker’s access point broadcasts a stronger signal, attracting adjacent devices.
  2. Deauthentication Attack: Wifiphishers can utilize de-authentication attacks to disconnect users from genuine Wi-Fi networks, forcing them to connect to the attacker’s rogue access point.
  3. Captive Portal: Once connected to the rogue access point, users are sent to a captive portal that appears to be a valid login page. This can be used to collect login passwords or other information from people who join the rogue network unintentionally.

Prerequisites

How to Install the WIFIPhisher Tool on Kali Linux?

In this section, we will see the detailed steps to install the WIFIPhisher Tool on Kali Linux with all command executions.

Step 1: First open your virtual machine then open the terminal and install all the required things.

Step 2: Install the required dependencies using the following command.

$ sudo apt-get install -y python3-setuptools python3-dev libssl-dev libffi-dev build-essential

Installing Dependencies

Step 3: Clone the Wifiphisher repository from GitHub.

$ git clone https://github.com/wifiphisher/wifiphisher.git

Cloning Tool from Github

Step 4: Change into the Wifiphisher directory.

$ cd wifiphisher

Step 5: Install Wifiphisher using the setup script. This will install Wifiphisher along with its dependencies.

$ sudo python3 setup.py install

Installing Tool along with Dependencies

The error message indicates that the dnsmasq package is not installed on your system. dnsmasq is a lightweight DNS and DHCP server, and Wifiphisher requires it to run.

We can install dnsmasq using the following command.

$ sudo apt-get install dnsmasq

After that again you have to run the same command then it will work correctly as shown in the image.

Successfull Installtion of Tool

Step 6: Using the below command you can install it command is installing the necessary packages (wifiphisher, hostapd, dnsmasq, pythonpyric, python-jinja2) that are required for running and using the wifiphisher tool on a Debian-based Linux system.

$ sudo apt-get install wifiphisher hostapd dnsmasq python3-pyric python3-jinja2

Installing required Packages

As you can now it is working fine which is relevant to WIFIPhisher Kali Linux tools.

Step 7: After the installation is complete, you can run Wifiphisher or using the following command take help.

$ sudo wifiphisher -h

Verifying Installation

How to use the WIFIPhisher Tool on Kali Linux?

In this section, we will explore the practical usage of the WIFIPhisher tool on the Kali Linux Operating System.

Example 1: Rogue AP, DoS, and Firmware Upgrade

For generating the rogue Access Point, use wlan0, and for DoS attacks, use wlan4. Manually select the target network from the list and run the “Firmware Upgrade” scenario. Check the captured Pre-Shared Key against the handshake in the handshake.pcap file to ensure it is correct.

$ wifiphisher -aI wlan0 -eI wlan4 -p firmware-upgrade --handshake-capture handshake.pcap

Rogue AP, DoS, and Firmware Upgrade

Example 2: Open Wi-Fi Network “FREE WI-FI” with OAuth Login Scenario

In this example, the tool used is Wifiphisher, a security tool designed for Wi-Fi penetration testing. The scenario involves creating an open Wi-Fi network named “FREE WI-FI” with the ESSID parameter. Additionally, the --noextensions option ensures that no extensions are loaded during the execution.

$ sudo wifiphisher --noextensions --essid "FREE WI-FI" -p oauth-login -kB


The --essid "FREE WI-FI" specifies the desired network name for the open Wi-Fi network. By running the command, the tool initiates the “OAuth Login” scenario.

Open Wi-Fi Network "FREE WI-FI" with OAuth Login Scenario

Frequently Asked Questions on WIFIPhisher Tool – FAQs

What is WIFIPhisher in Kali Linux?

WIFIPhisher is a security tool in Kali Linux designed for ethical hacking and penetration testing. It performs social engineering attacks to test Wi-Fi network security.

Is WIFIPhisher legal to use?

WIFIPhisher is legal when used for ethical hacking, security assessments, and educational purposes with proper authorization. Unauthorized use for malicious activities is illegal.

How does WIFIPhisher work?

WIFIPhisher sets up a rogue Wi-Fi access point, conducts de-authentication attacks, and uses a captive portal to trick users into connecting. It’s used to assess Wi-Fi network vulnerabilities.

Conclusion

In conclusion, WIFIPhisher is a powerful security tool available on Kali Linux that is specifically developed for ethical hacking and Wi-Fi network penetration testing. Its capabilities, such as social engineering assaults and network impersonation, make it useful to security professionals. However, it is critical to emphasize the need for ethical and lawful use, with illegal or malevolent behavior firmly prohibited. WIFIPhisher’s responsible and allowed use can greatly contribute to finding and addressing Wi-Fi network vulnerabilities, hence improving overall cybersecurity.



Like Article
Suggest improvement
Share your thoughts in the comments

Similar Reads