How to Install Wifiphisher on Kali Linux 2021

On this tutorial you will learn how to install Wifiphisher Rogue Access Point on Kali Linux to create Evil Twin attacks against Wifi networks. it can be used

Install WifiPhisher
WifiPhisher

What is WifiPhisher?

Wifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing

please use python 3 to install wifiphisher

wifiphisher

Install WifiPhisher dependencies

[email protected]:~/$ sudo apt-get install wifiphisher hostapd dnsmasq python-pyric python-jinja2

Clone WifiPhisher Repo

[email protected]:~/$ git clone https://github.com/wifiphisher/wifiphisher.git

Install WifiPhisher

[email protected]:~/$ cd wifiphisher
[email protected]:~/wifiphisher$ sudo python3 setup.py install
[email protected]:~/wifiphisher$ sudo apt-get install libnl-3-dev libnl-genl-3-dev

Stop Network Manager

[email protected]:~/wifiphisher$ sudo systemctl stop NetworkManager

Start WifiPhisher

[email protected]:~/wifiphisher$ sudo wifiphisher

WifiPhisher Troubleshooting

WifiPhisher Troubleshooting
WifiPhisher Troubleshooting
 [email protected]:~/wifiphisher$ sudo update-alternatives --set iptables /usr/sbin/iptables-legacy

WifiPhisher Help

[email protected]:~/wifiphisher$ sudo wifiphisher -h

Interfaces Help

Short formLong formExplanation
-i INTERFACE–interface INTERFACE
-eI EXTENSIONSINTERFACE–extensionsinterface
-aI APINTERFACE–apinterface APINTERFACE
-iI INTERNETINTERFACE–internetinterface INTERNETINTERFACE
-pI PROTECTINTERFACE–protectinterface PROTECTINTERFACE
-iAM MAC_AP_INTERFACE–mac-ap-interface MAC_AP_INTERFACE
-iEM MAC_EXTENSIONS_INTERFACE–mac-extensions-interface MAC_EXTENSIONS_INTERFACE
-iNM–no-mac-randomization

Logging Help

Short formLong formExplanation
–logging
-lP LOGPATH–logpath LOGPATHDetermine the full path of the logfile.
-cP LOG_PATH–credential-log-path CREDENTIAL_LOG_PATHDetermine the full path of the file that will store any captured credentials

Attacks Help

Short formLong formExplanation
-kB–known-beaconsBroadcast a number of beacon frames advertising popular WLANs
-fH–force-hostapdForce the usage of hostapd installed in the system
-pPD PHISHING_PAGES_DIRECTORY–phishing-pages-directory PHISHING_PAGES_DIRECTORYSearch for phishing pages in this location
-pE PHISHING_ESSID–phishing-essid PHISHING_ESSIDDetermine the ESSID you want to use for the phishing page
-lE LURE10_EXPLOIT–lure10-exploit LURE10_EXPLOIT
-lC–lure10-capture

GitHub Wifiphisher

WifiPhisher ReadTheDocs

Hacking Wireless Networks 802.11 a/b/g/n/ac