Monday, January 25, 2016

Rogue Access Point Toolkit : MANA


The MANA Toolkit evilAP attacks first presented at Defcon 22
More specifically, it contains the improvements to KARMA attacks with hostapd, as well as some useful configs for conducting MitM once you’ve managed to get a victim to connect.

Rogue Access Point Toolkit

It contains:
  • kali/ubuntu-install.sh – simple installers for Kali 1.0.9 and Ubuntu 14.04 (trusty)
  • slides – an explanation of what we’re doing here
  • run-mana – the controller scripts
  • hostapd-manna – modified hostapd that implements our new karma attacks
  • crackapd – a tool for offloading the cracking of EAP creds to an external tool and re-adding them to the hostapd EAP config (auto crack ‘n add)
  • sslstrip-hsts – our modifications to LeonardoNVE’s & moxie’s cool tools
  • apache – the apache vhosts for the noupstream hacks; deploy to /etc/apache2/ and /var/www/ respectivley

Installation

  • The simplest way to get up and running is it “apt-get install mana-toolkit” on Kali.
  • To get up and running setup a Kali 1.0.9 box (VM or otherwise), update it, then run kali-install.sh
  • To get up and running setup a Ubuntu 14.04 box (VM or otherwise), update it, then run ubuntu-install.sh
  • The ubuntu installer has much more dependency info than the kali one if you’re looking for a template.

Rogue Access Point Evil Rogue Access Point Rogue Access PointPrerequisites

Software
Check the ubuntu installer for more details on software pre-requisites.
Hardware 
You’ll need a wifi card that supports master mode. You can check whether it does by running: iw list You want to see “AP” in the output. Something like:
Supported interface modes:
         * IBSS
         * managed
         * AP
         * AP/VLAN
         * monitor
         * mesh point

Running

Mana has several components, these can be started using the example start scripts, or you can use these as templates to mix your own.
Mana will be installed to several directories:
  • The mana tools are installed to /usr/share/mana-toolkit
  • The start scripts are in /usr/share/mana-toolkit/run-mana
  • The captured traffic will be in /var/lib/mana-toolkit
The different start scripts are listed below and must be edited to point to the right wifi device (default is wlan0, this may not be right for your installation):
  • start-nat-full.sh – Will fire up MANA in NAT mode (you’ll need an upstream link) with all the MitM bells and whistles.
  • start-nat-simple.sh – Will fire up MANA in NAT mode, but without any of the firelamb, sslstrip, sslsplit etc.
  • start-noupstream.sh – Will start MANA in a “fake Internet” mode. Useful for places where people leave their wifi on, but there is no upstream Internet. Also contains the captive portal.
  • start-noupstream-eap.sh – Will start MANA with the EAP attack and noupstream mode.
While these should all work, it’s advisable that you craft your own based on your specific needs.



Source && Download

https://n0where.net/rogue-access-point-toolkit-mana/

No comments:

Portugal politics Intel ( Caso Gémeas) provas ( BACK2WAR Intelligence deliever to Russia part (excerpt) of the content of the son's email that proves Marcelo RSousa's favor in the "Case of the Twins" IT WILL HV A PRICE)

  https://www.cmjornal.pt/sociedade/detalhe/emails-comprovam-pedidos-de-nuno-rebelo-de-sousa-a-marcelo-no-caso-das-gemeas-luso-brasileiras