/eta

An Evil Twin Attacker

Primary LanguageShell

eta

An Evil Twin Attacker

IMPORTANT! Please backup apache2.config (/etc/apache2/apache2.conf), Dnsmasq.config (/etc/dnsmasq.conf) and all your files at /var/www before using this application. Clean.sh is executed by keycheck.sh. Don't start it manually.

This creates an evil twin of a wifi access point and directs all the web requests to a webserver run on the attacker machine. (Like a captive portal) It asks the victim to enter the passphrase to re-establish connection, captures it and records in a key.txt file. Then the fake AP goes down itself.

Web server is run by Apache, DNS and DHCP configuration by Dnsmasq and fake AP by Airbase-ng.

Extract the files, run eta.sh under root.