For a more in-depth walkthrough see here: https://rhaidiz.net/2018/10/25/dribble-stealing-wifi-password-via-browsers-cache-poisoning/
DISCLAIMER: this is till a work in progress and a lot of small improvements should be implemented so keep that in mind.
Dribble relays on the following software to work, so make sure you have them installed:
Download and run
To run dribble, just download the repo and run it as root.
git clone https://github.com/rhaidiz/dribble cd dribble sudo ./dribble
At the moment there isn't a proper configuration file for dribble. So customization should be edited direcly from the following files:
dribble.sh: to change the network configuration such as the local subnet of the fake access point and the ESSID
dribble.cap: change it to point to the location of
inject-drible.jsand should also be canghed accordingly if you changed the subnet of the fake access point
dnsentries.hosts: change so that
dribble.poisonpoints to the IP address of the fake access point
www/js/dlink.js: to change the end-point where to send the Wi-Fi password