EAPHammer -Twin Attacks against WPA2-Enterprise Network

EAPHammer is a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. It is designed to be used in full scope wireless assessments and red team engagements. As such, focus is placed on providing an easy-to-use interface that can be leveraged to execute powerful wireless attacks with minimal manual configuration.

EAPHammer - Targeted Evil Twin Attacks against WPA2-Enterprise Networks
EAPHammer – Targeted Evil Twin Attacks against WPA2-Enterprise Networks

There is a Quick Start section to provide example of how to execute a credential stealing evil twin attack against a WPA/2-EAP network in just commands.

Included features with this are:

  • Steal RADIUS credentials from WPA-EAP and WPA2-EAP networks.
  • Perform hostile portal attacks to steal AD creds and perform indirect wireless pivots
  • Perform captive portal attacks
  • Built-in Responder integration
  • Support for Open networks and WPA-EAP/WPA2-EAP
  • No manual configuration necessary for most attacks.
  • No manual configuration necessary for installation and setup process
  • Leverages latest version of hostapd (2.8)
  • Support for evil twin and karma attacks
  • Generate timed Powershell payloads for indirect wireless pivots
  • Integrated HTTP server for Hostile Portal attacks
  • Support for SSID cloaking
  • Fast and automated PMKID attacks against PSK networks using hcxtools
  • Password spraying across multiple usernames against a single ESSID

You can read more and download this tool over here: https://github.com/s0lst1c3/

Share
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments