Skip to content

Vinnybrunn00/Linset_Evil_Twin_Attack

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 

Repository files navigation

Linset Is Not a Social Enginering Tool

First of all, commented that this is a project for educational purposes that have served to me (and hopefully others) to be more in touch with the world of programming and Wireless. It is prohibited under any circumstances the use this tool in foregin Wireless Networks!

How it works

  • Scan the networks.
  • Select network.
  1. Capture handshake (can be used without handshake)
  2. We choose one of several web interfaces tailored for me (thanks to the collaboration of the users)
  3. Mounts one FakeAP imitating the original
  4. A DHCP server is created on FakeAP
  5. It creates a DNS server to redirect all requests to the Host
  6. The web server with the selected interface is launched
  7. The mechanism is launched to check the validity of the passwords that will be introduced
  8. It deauthentificate all users of the network, hoping to connect to FakeAP and enter the password.
  9. The attack will stop after the correct password checking

Are necessary tengais installed dependencies, which Linset check and indicate whether they are installed or not.

It is also preferable that you still keep the patch for the negative channel, because if not, you will have complications relizar to attack correctly

How to use

$ chmod +x linset
$ ./linset

About

Linset - Evil Twin Attack from the old Wifislax system.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages