Skip to content

New Wi-Fi attack method: "Deauth+Clone+Verify"#762

Merged
pr3y merged 5 commits intoBruceDevices:mainfrom
7wp81x:main
Mar 18, 2025
Merged

New Wi-Fi attack method: "Deauth+Clone+Verify"#762
pr3y merged 5 commits intoBruceDevices:mainfrom
7wp81x:main

Conversation

@7wp81x
Copy link
Contributor

@7wp81x 7wp81x commented Feb 1, 2025

Proposed Changes

Added a new Wi-Fi attack method: "Deauth+Clone+Verify".

  • Deauths the target network.
  • Clones the network with the same SSID.
  • If the user enters the correct wireless password, the attack stops.
  • If the password is incorrect or not provided, deauthentication continues.

Types of Changes

"Deauth+Clone+Verify" New WiFi Attack Feature

Verification

Tested on CYD-2432S028 and CYD-2USB

Testing

Tested other Wifi atks feature that uses the evil_portal.cpp, seems working properly..

User-Facing Change

Added "Deauth+Clone+Verify" Wi-Fi attack, which forces users to authenticate by continuously deauthing until the correct password is provided.

Further Comments

Instead of stopping the deauth and manually checking the captured passwords, this new feature automates the process by continuously deauthing until the correct credentials are provided.

Check whether the received password is valid wireless password.
Added the ability to verify the wifi passwd submited by the client.
Some changes for wifi passwd verifier...
New Wi-Fi Attack Deauth+Clone+Verify
@GabriWar
Copy link
Contributor

nice, tested and working, hoping for a merge soon

@Huzzla101
Copy link

Huzzla101 commented Feb 19, 2025 via email

@7wp81x
Copy link
Contributor Author

7wp81x commented Feb 20, 2025

the disadvantage of this is you must be at range of the target AP.. otherwise it can't verify the password.. also it will disconnect all the clients when checking the pwd...

but i have an idea.. i don't know if this can work on few lines code but.. here:

  1. We all know that it disconnect the clients from the AP and start a rouge AP right? so how about we capture the Handshake when it was disconnecting the clients from the AP... then after successful capture start the rouge AP and continue disconnecting...

  2. create a password checker... that will check whether the password provided on rouge AP (Evil portal) matches the handshake...?

sorry for my explaination

@pr3y pr3y merged commit d77b289 into BruceDevices:main Mar 18, 2025
5 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants