Detects wireless attacks performed by KARMA module

It Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points).

Working Principle for

  • Collects all the packets from Wireless Network. (Probe Response)
  • Analyses all the packets in real time.
  • If PiKarma finds more than one SSID info from mac address in Probe Response;
  • Logs the activity with some extra information within defined template and sends deauthentication packets

How works KARMA Attack?

  • Sends Probe Response for all Probe Requests

Example:

Softwares and hardwares that uses KARMA module

  • FruityWifi
  • WiFi Pineapple
  • Mana (improvements to KARMA attacks)

TO Check all DEMO click the following YouTube Link
https://www.youtube.com/playlist?list=PLwHi7Vsh6TpNrCX87KRzO9WVtHmqqC2aB

Usage

Requirements

  • Hardware: TP LINK TL-WN722N or Dark RangeMax wifi card
  • Modules: scapy, time, termcolor, argparse, netifaces, logging

Kali Linux:

Download PiKarma:

git clone https://github.com/WiPi-Hunter/PiKarma.git

Install Python librarie(s):

pip install termcolor

It’s done!

Run the with following command:

Monitor mode:

airmon-ng start interface(wlan0,wlan1) (Monitor mode)


or


ifconfig wlan0 down
iwconfig wlan0 mode Monitor
ifconfig wlan0 up

Run:

cd PiKarma
python PiKarma.py -h



Download



Source link

LEAVE A REPLY

Please enter your comment!
Please enter your name here