Skip to content

Latest commit

 

History

History
67 lines (44 loc) · 1.83 KB

README.md

File metadata and controls

67 lines (44 loc) · 1.83 KB

TwinHunter

A proof of concept project to detect an stop Evil Twin Attacks.

What It Does

Scans the wireless airspace and looks for wireless access points that may be imitating a legitmate one (this is called an evil twin attack). If an Evil Twin is discovered then it will be instantly flooded with deauth frames preventing any clients from connecting to it.

Known Issues

  • No channel hopping
  • Deauthing never stops even if the access point goes away
  • Threads opened by the Deauther are not stopped properly
  • Observers of the Scanner object are not stopped properly

Goals

  • Fix the known issues
  • Allow white listing of multiple wifi access points
  • Allow the use of multiple wifi interfaces to limit the amount of channel hopping a single interface needs to do
  • Be able to detect and respond to other wifi events not just beacons

Setup

This projects requires Python 3.5 or greater.

  • Clone the repo:

    git clone https://github.com/frozenjava/TwinHunter.git
  • Install the requirements

    cd TwinHunter
    pip install -r requirements.txt
  • Identify your wireless card with ifconfig. Assuming wlan0 for this README.

The remaining steps will need to be run with root privileges.

  • Put your wireless interface into monitor mode

    airmon-ng start wlan0
  • Run the script using the WiFi name (ESSID) and a mac address serving that WiFi (BSSID)

    chmod +x twinhunter.py
    ./twinhunter.py --iface wlan0mon --essid home --bssid 00:11:22:33:44:55

Once it successfully discovers the net work you will see a log similar to

Discorvered Accesspoint => BSSID: 00:11:22:33:44:55 | ESSID: home

The process will continue to scan for evil twins. If one is discovered, additional logs will appear

FOUND EVIL TWIN!!! BSSID: 00:11:22:33:44:55 | ESSID: home