The Musket Team has refined this phishing attack. We have added a WPA module allowing you to mimic the Target AP at the beginning of the attack.
Using the WPA module in the attack requires monitoring the computer.
Attack sequence is as follows:
Setup a WPA encrypted rogueAP with same name.
RogueAP should have active clients associated. Use airodump-ng to monitor the client-targetAP state.
Choose a different channel at least three(3) channel numbers away from the targetAP to avoid mdk3 interference.
DOS the targetAP with an mdk3 –g or airdrop-ng.
Clients will try and access your WPA rogueAP but will be unable to, as the keys do not match. Airbase-ng running in the Eterm screen will show this activity.
With clients trying to associate to the rogueAP, shut the phish program down and retart.
Now choose the unencrypted rogueAP. And see if you get a bite.
Remember phishing requires pretty lures, guile, timing and some luck.
You can download new script file for free at:
http://www.axifile.com/en/92E92D240F
The script file is being rewritten to allow faster restart. When finished we will post here.
MTA