Skip to content

WiPi-Hunter/PiSavar

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

99 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

PiSavar - Detects PineAP module and starts deauthentication attack (for fake access points - WiFi Pineapple Activities Detection)

About Project

The goal of this project is to find out the fake access points opened by the WiFi pineapple device using the PineAP module and to prevent clients from being affected by initiating a deauthentication attack to the attacking device.

How PineAP Module Works

  • Collects SSID information
  • Creates SSID pool with collected SSID information
  • Creates fake access points using information in the SSID pool

Where is the problem?

  • #f03c15 One MAC address, more than one SSID information .... ..- -. - . .-.

Features of PiSavar

  • Detects PineAP activities.
  • Detects networks opened by PineAP.
  • Starts deauthentication attack for PineAP.

Features to add

  • List of clients connected to fake access points
  • Record activities - Logging

Diagram

--------------------------------------------------------------------------------

Usage

Requirements

  • Hardware: TP LINK TL-WN722N
  • Modules: scapy, time, termcolor, argparse, commands, netifaces, logging

Kali Linux:

Download pisavar:

git clone https://github.com/WiPi-Hunter/PiSavar.git

Install Python librarie(s):

pip install termcolor

It's done!

Run the program with following command:

Monitor mode:

airmon-ng start interface(wlan0,wlan1) (Monitor mode)

or 

ifconfig wlan0 down
iwconfig wlan0 mode Monitor
ifconfig wlan0 up

Run:

cd PiSavar
python pisavar.py -h

Screenshots

Demo Video

Authors

This project is coded by Besim ALTINOK

About

📡 🍍Detects activities of PineAP module and starts deauthentication attack (for fake access points - WiFi Pineapple Activities Detection)

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages