c41n – an automated Rogue Access Point setup tool.

C41N - An Automated Rogue Access Point Setup Tool

c41n provides automatic setup of quite a few styles of Rogue Obtain Details, and Evil Twin attacks. c41n sets up an obtain level with person-outlined properties (interface, name, and channel for the entry issue), sets up a DHCP server for the entry point, and gives the consumer with qualities of HTTP visitors sniffing, or Captive Portal set up with credential sniffing.

https://github.com/MS-World-wide-web-BN/c41n

Set up:

The installation is made up of cloning the repo, running a script that will set up dependencies, or put in them manually, and making c41n executable. Installation script performs with apt and Pacman bundle managers (Debian and Arch only).

# git clone https://github.com/MS-World wide web-BN/c41n/
# cd c41n
# sudo bash install.sh
# sudo chmod +x c41n

Dependencies can also be mounted manually (without having the script) with apt-get deal manager (Debian and Debian based distributions):

# sudo apt-get install net-resources hostapd dnsmasq tcpflow

and pacman (Arch and Arch-based mostly distributions):

# sudo pacman -Sy internet-instruments hostapd dnsmasq tcpflow

Usage:

c41n can be operate in interactive, and swift method.

To operate c41n in interactive mode:

# ./c41n

Swift manner:

Get started Rogue AP:

# ./c41n    

Begin Rogue AP + sniffing HTTP targeted visitors:

# ./c41n sniff    

Start Rogue AP + captive portal:

# ./c41n captive     

Redirection parameter can have the pursuing values:

: Redirects only predefined domains.
1: Redirects all traffic.
domains_file: Redirects predefined domains + domains from specified file (divided by new line).

Illustrations:

[1] Get started Rogue AP on wlan0 interface, route traffic from eth0 interface, AP identify: ‘AP’, AP channel: ‘1’

# ./c41n wlan0 eth0 AP 1

[2] Commence Rogue AP and sniff HTTP website traffic on wlan0 interface, route targeted visitors from wlan1 interface, AP title: ‘Access_Point’, AP channel: ‘6’

# ./c41n sniff wlan0 wlan1 Accessibility_Place 6

[3] Start Rogue AP with a captive portal on wlp6s0 interface, redirect default domains and domains from tailor made file (/property/identify/Files/domains.txt), route site visitors from eth1 interface, AP name: ‘router’, AP channel: ‘9’

# ./c41n captive wlp6s0 eth1 router 9 /home/identify/Documents/domains.txt

License:

The computer software is free to use, modify, and distribute, as extended as the credit is specified to the creator (n1x_ [MS-WEB]).

Disclaimer:

Any steps and/or things to do are accomplished by utilizing h4rpy are exclusively your accountability. The misuse of h4rpy can outcome in prison prices introduced towards the people in problem. The writer will not be held accountable in the celebration any legal costs be brought against any men and women misusing h4rpy to crack the law.

Contribution observe:

Every single of the scripts/applications/packages hosted in this article is produced as a element of MS-WEBs cybersecurity programs, aimed towards novices, for that reason are purely academic and/or demonstration, and are intended to stay that way, even if the wider audience and actual-entire world usage are reached. All pauses current in code are there so that the person can study the output, so the action that is functioning is recognized.

All pull requests getting rid of this sort of pauses, or pieces of the output are against the educational purpose, and will not be accepted.

To clear away sleeps from c41n use:

sed -i '/snooze/d' ./c41n

The submit c41n – an automatic Rogue Entry Position set up tool. appeared first on Hakin9 – IT Protection Journal.

Impression and Report Supply backlink

Go through Additional on Pentesting Resources

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *