Overview
Wireless attack tools help security professionals test the security of Wi-Fi networks, identify vulnerabilities in wireless protocols, and assess wireless infrastructure security. These tools require specialized wireless adapters that support monitor mode and packet injection.Use Cases
- Wi-Fi Security Auditing: Test wireless network security
- WPA/WPA2 Testing: Assess encryption strength
- Rogue AP Detection: Identify unauthorized access points
- Client Security: Test wireless client security
- Protocol Analysis: Analyze wireless protocols and vulnerabilities
Hardware Requirements
Wireless Adapter: Most built-in Wi-Fi cards don’t support monitor mode. Recommended adapters:
- Alfa AWUS036NHA (2.4 GHz)
- Alfa AWUS036ACH (Dual-band)
- TP-Link TL-WN722N v1 (2.4 GHz)
- Panda PAU09 (2.4 GHz)
Available Tools
WiFi-Pumpkin3
Rogue AP framework for MITM attacks
Pixiewps
WPS pixie dust attack tool
BluePot
Bluetooth honeypot framework
Fluxion
Automated MITM WPA attack
Wifiphisher
Rogue AP phishing framework
Wifite
Automated wireless auditing tool
EvilTwin (Fakeap)
Evil twin attack with fake login page
Fastssh
Multi-threaded SSH scanner and brute-forcer
Howmanypeople
Count nearby devices via Wi-Fi monitoring
WiFi-Pumpkin3
Description
WiFi-Pumpkin is a comprehensive rogue access point framework that creates fake networks while forwarding legitimate traffic to and from unsuspecting targets. It’s designed for security testing and demonstrating MITM attacks.Installation
Running
Features
- Rogue access point creation
- MITM attack framework
- Credential harvesting
- Traffic sniffing and manipulation
- DNS spoofing
- Captive portal support
- Plugin system for extensions
Basic Usage
Pixiewps
Description
Pixiewps exploits the low or non-existing entropy of some Access Points’ WPS implementation, performing what’s known as the “pixie dust attack” to recover WPS PINs offline.Installation
Usage Workflow
What is Pixie Dust Attack?
Technical Details
Technical Details
The pixie dust attack exploits weak random number generation in some WPS implementations. Instead of trying all possible PINs:
- Captures WPS handshake
- Analyzes entropy of nonces
- Brute-forces weak PRNG offline
- Recovers WPS PIN in seconds/minutes
BluePot
Description
Bluetooth honeypot GUI framework for detecting and analyzing Bluetooth attacks. Requires at least one Bluetooth receiver.Installation
Running
Requirements
- Java Runtime Environment
- Bluetooth adapter
- Linux:
libbluetooth-dev(Ubuntu) orbluez-devel(Fedora)
Fluxion
Description
Fluxion is an automated MITM attack tool that creates a fake AP, deauthenticates clients, and presents them with a phishing page to capture WPA passwords.Installation
Running
How Fluxion Works
- Scan: Identifies target networks
- Capture: Captures handshake (optional)
- Deauth: Disconnects clients from real AP
- Fake AP: Creates identical rogue AP
- Captive Portal: Shows fake login page
- Capture: Logs entered password
- Verify: Tests password against captured handshake
Wifiphisher
Description
Rogue Access Point framework for conducting red team engagements and Wi-Fi security testing through victim-customized web phishing attacks.Installation
Running
Attack Scenarios
Features
- Targeted Wi-Fi association attacks
- Automated victim-customized phishing
- Credential harvesting
- Malware delivery capabilities
- Multiple phishing scenarios
- Custom template support
Available Phishing Scenarios
Available Phishing Scenarios
- firmware-upgrade: Fake router firmware update
- oauth-login: OAuth credential phishing
- network-manager: Network connection authentication
- browser-plugin: Fake browser update
- custom: Create your own templates
Wifite
Description
Automated wireless auditing tool that attacks multiple WEP, WPA, and WPS encrypted networks. It’s designed to be user-friendly and require minimal configuration.Installation
Running
Usage Examples
Attack Methods
- WPA/WPA2: Handshake capture + wordlist
- WPS PIN: Brute-force or pixie dust
- WEP: Various attacks (ARP replay, chopchop, etc.)
Automation: Wifite automatically selects the best attack method based on target capabilities and captured data.
EvilTwin (Fakeap)
Description
Creates a fake access point with a captive portal login page to capture credentials. The script automates the evil twin attack setup.Installation
Running
Attack Flow
- Select wireless interface
- Configure fake AP (SSID, channel)
- Start fake access point
- Enable captive portal
- Wait for credentials
- Credentials logged to file
Fastssh
Description
Multi-threaded SSH scanner and brute-force tool using common credentials. While not strictly a wireless tool, it’s useful for testing exposed SSH services discovered on wireless networks.Installation
Running
Howmanypeople
Description
Monitors Wi-Fi signals to count the number of devices (people) around you. Useful for security assessments and understanding wireless device density.Installation
Running
Features
- Passive device counting
- MAC address tracking
- Real-time monitoring
- CSV output for analysis
Best Practices
Pre-Attack Preparation
Wireless Security Testing Methodology
-
Reconnaissance
-
Vulnerability Assessment
- Check for WEP (deprecated, easily cracked)
- Test WPS PIN (pixie dust, brute-force)
- Capture WPA handshakes
- Identify weak passwords
-
Exploitation
- Automated tools (Wifite)
- Manual attacks (aircrack-ng suite)
- Social engineering (Wifiphisher)
-
Documentation
- Log all findings
- Screenshot evidence
- Note vulnerable configurations
Avoiding Detection
Common Wireless Vulnerabilities
WEP Encryption
Deprecated protocol, can be cracked in minutes
WPS Enabled
Vulnerable to brute-force and pixie dust attacks
Weak Passwords
Short or common passwords easily cracked
Deauth Vulnerability
WPA2 vulnerable to deauthentication attacks
Wireless Cracking Workflow
WPA/WPA2 Handshake Capture
WPS PIN Attack
Defensive Recommendations
After testing, recommend these security measures:- Disable WPS - Major vulnerability vector
- Use WPA3 - Latest encryption standard
- Strong Passwords - 16+ characters, random
- MAC Filtering - Additional layer (not primary security)
- Hide SSID - Obscurity, not security (still test)
- Network Segmentation - Separate guest network
- Monitor for Rogues - Regular wireless audits
- Update Firmware - Patch known vulnerabilities
Troubleshooting
Monitor Mode Won't Enable
Monitor Mode Won't Enable
No Handshake Captured
No Handshake Captured
Solutions:
- Wait for legitimate client to connect
- Increase deauth packet count
- Try different channels
- Ensure client is actively connected
- Check if AP uses 802.11w (protected frames)
Adapter Not Detected
Adapter Not Detected
Check: