In this tutorial, you will learn how to install Wifiphisher Rogue Access Point on Kali Linux to create Evil Twin attacks against Wifi networks.

WifiPhisher is a security tool designed for educational purposes to demonstrate weaknesses in wireless networks. It’s typically used to simulate and execute phishing attacks against Wi-Fi networks.

The tool aims to raise awareness about the importance of securing Wi-Fi networks and understanding potential threats.

install Wifiphisher
install Wifiphisher

What is WifiPhisher?

Wifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing with legal permission.

please use python 3 to install wifiphisher

wifiphisher

Install WifiPhisher dependencies

kali@OffSec:~/$ sudo apt-get install hostapd dnsmasq python-pyric python-jinja2

Clone WifiPhisher Repo

kali@OffSec:~/$ git clone https://github.com/wifiphisher/wifiphisher.git

How to Install WifiPhisher

After all dependencies and clone repo from git hub install Wifiphisher is very simple, just enter the folder

kali@OffSec:~/$ cd wifiphisher
kali@OffSec:~/wifiphisher$ sudo python3 setup.py install
kali@OffSec:~/wifiphisher$ sudo apt-get install libnl-3-dev libnl-genl-3-dev

Stop Network Manager

kali@OffSec:~/wifiphisher$ sudo systemctl stop NetworkManager

Start WifiPhisher

kali@OffSec:~/wifiphisher$ sudo wifiphisher

WifiPhisher Troubleshooting

 kali@OffSec:~/wifiphisher$ sudo update-alternatives --set iptables /usr/sbin/iptables-legacy

WifiPhisher Help

kali@OffSec:~/wifiphisher$ sudo wifiphisher -h

Interfaces Help

Short formLong formExplanation
-i INTERFACE–interface INTERFACE
-eI EXTENSIONSINTERFACE–extensionsinterface
-aI APINTERFACE–apinterface APINTERFACE
-iI INTERNETINTERFACE–internetinterface INTERNETINTERFACE
-pI PROTECTINTERFACE–protectinterface PROTECTINTERFACE
-iAM MAC_AP_INTERFACE–mac-ap-interface MAC_AP_INTERFACE
-iEM MAC_EXTENSIONS_INTERFACE–mac-extensions-interface MAC_EXTENSIONS_INTERFACE
-iNM–no-mac-randomization

Logging Help

Short formLong formExplanation
–logging
-lP LOGPATH–logpath LOGPATHDetermine the full path of the logfile.
-cP LOG_PATH–credential-log-path CREDENTIAL_LOG_PATHDetermine the full path of the file that will store any captured credentials

Attacks Help

Short formLong formExplanation
-kB–known-beaconsBroadcast a number of beacon frames advertising popular WLANs
-fH–force-hostapdForce the usage of hostapd installed in the system
-pPD PHISHING_PAGES_DIRECTORY–phishing-pages-directory PHISHING_PAGES_DIRECTORYSearch for phishing pages in this location
-pE PHISHING_ESSID–phishing-essid PHISHING_ESSIDDetermine the ESSID you want to use for the phishing page
-lE LURE10_EXPLOIT–lure10-exploit LURE10_EXPLOIT
-lC–lure10-capture

GitHub Wifiphisher

WifiPhisher ReadTheDocs

Wifi Pumpkin 3: How to Install

How to Install Wifiphisher

Oh hi there 👋
It’s nice to meet you.

Sign up to receive awesome content in your inbox, every month.

Read our privacy policy for more info.

Categorized in:

Wireless Hacking, Tools,

Last Update: 30/03/2024