How to Install Wifiphisher on Kali
Posted in: Tools

How to Install Wifiphisher | Wireless Pentesting

On this tutorial you will learn how to install Wifiphisher Rogue Access Point on Kali Linux to create Evil Twin attacks against Wifi networks.

install Wifiphisher
install Wifiphisher

What is WifiPhisher?

Wifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing with legal permission.

please use python 3 to install wifiphisher

wifiphisher

Install WifiPhisher dependencies

[email protected]:~/$ sudo apt-get install hostapd dnsmasq python-pyric python-jinja2

Clone WifiPhisher Repo

[email protected]:~/$ git clone https://github.com/wifiphisher/wifiphisher.git

How to Install WifiPhisher

After all dependencies and clone repo from git hub install Wifiphisher is very simple, just enter the folder

[email protected]:~/$ cd wifiphisher
[email protected]:~/wifiphisher$ sudo python3 setup.py install
[email protected]:~/wifiphisher$ sudo apt-get install libnl-3-dev libnl-genl-3-dev

Stop Network Manager

[email protected]:~/wifiphisher$ sudo systemctl stop NetworkManager

Start WifiPhisher

[email protected]:~/wifiphisher$ sudo wifiphisher

WifiPhisher Troubleshooting

 [email protected]:~/wifiphisher$ sudo update-alternatives --set iptables /usr/sbin/iptables-legacy

WifiPhisher Help

[email protected]:~/wifiphisher$ sudo wifiphisher -h

Interfaces Help

Short formLong formExplanation
-i INTERFACE–interface INTERFACE
-eI EXTENSIONSINTERFACE–extensionsinterface
-aI APINTERFACE–apinterface APINTERFACE
-iI INTERNETINTERFACE–internetinterface INTERNETINTERFACE
-pI PROTECTINTERFACE–protectinterface PROTECTINTERFACE
-iAM MAC_AP_INTERFACE–mac-ap-interface MAC_AP_INTERFACE
-iEM MAC_EXTENSIONS_INTERFACE–mac-extensions-interface MAC_EXTENSIONS_INTERFACE
-iNM–no-mac-randomization

Logging Help

Short formLong formExplanation
–logging
-lP LOGPATH–logpath LOGPATHDetermine the full path of the logfile.
-cP LOG_PATH–credential-log-path CREDENTIAL_LOG_PATHDetermine the full path of the file that will store any captured credentials

Attacks Help

Short formLong formExplanation
-kB–known-beaconsBroadcast a number of beacon frames advertising popular WLANs
-fH–force-hostapdForce the usage of hostapd installed in the system
-pPD PHISHING_PAGES_DIRECTORY–phishing-pages-directory PHISHING_PAGES_DIRECTORYSearch for phishing pages in this location
-pE PHISHING_ESSID–phishing-essid PHISHING_ESSIDDetermine the ESSID you want to use for the phishing page
-lE LURE10_EXPLOIT–lure10-exploit LURE10_EXPLOIT
-lC–lure10-capture

GitHub Wifiphisher

WifiPhisher ReadTheDocs

Wifi Pumpkin 3: How to Install

Back to Top