CodesParadox / NotEvilTwin

Evil Twin Tool Attack with Captive Portal on scapy

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Not Evil Twin - Attack and Defense Tool

  • This project was done as an exercise in a cyber course, for education only.

Not NotEvilTwin

Requirements

  • The code run on Unix OS (Kali, Ubuntu, etc.)
  • Hardware requirements:
    • 2 network interface, such that at least one of them has the ability to be in 'monitor mode'
      Notice that it is most likely that the internal network interface in your computer doen't have the ability to be switched to 'monitor mode', so you will need at least 1 external network interface
    • In your personal computer, give full premission to passwords.txt file (from NotEvilTwin/attack/html folder). You can do it by run the following command:
      $ sudo chmod +rwx passwords.txt
  • Requirements:
    • Update package manager:
      $ sudo apt-get update
      $ sudo apt-get upgrade
    • Install node-js:
      $ sudo apt install nodejs
    • Install npm:
      $ sudo apt install npm
    • Install express (require for js):
      $ npm install express
    • Install body-parser (require for js):
      $ npm install body-parser
    • Install node-wifi (require for js):
      $ npm install node-wifi
    • Install python3:
      $ sudo apt-get install python3.6
    • Install pip3:
      $ sudo apt install python3-pip
    • Install scapy:
      $ sudo pip3 install --pre scapy[complete]
    • Install gnome-terminal:
      $ sudo apt-get install gnome-terminal
    • Install hostapd:
      $ sudo apt-get install hostapd
    • Install dnsmasq:
      $ sudo apt-get install dnsmasq
    • Install iptables:
      $ sudo apt-get install iptables
  • You can clone our codes by typing this command in the terminal:
    $ git clone https://github.com/CodesParadox/NotEvilTwin

Attack Part

Files

Part 1

  • NotEvil.py

    • Step 1: Choosing an interface to put in 'monitor mode'
      Here you need to choose the network interface that will scan the network for possible APs (Access Points) to attack, and after that will send the de-authentication packets
      Notice that you need to choose the network interface that can be switched to 'monitor mode'

    • Step 2: Scanning the network for AP to attack
      Here you will see all the APs that were found in the network scan, and you need to choose the AP you want to attack. If no AP was found, you can choose either to rescan the network or to quit
      NotEvil

    • Step 3: Verifying that at least 1 client connected to the AP you choose
      In order to attack the chosen AP we need to verify that there is at least 1 client connected to it. If no client found, you can choose either to rescan for clients or to quit
      NotEvil

    • Step 4: Disconnect the connection between the AP from the client
      Here we want to disconnect between the chosen AP and client. We will do that by running deauth.py, this file will run in the background as long as the attack is running NotEvil

    • Step 5: Put the interface back in 'managed mode'
      Once attack done, we need to switch back the network interface to 'managed mode'

  • deauth.py

    • Here we will send the deauthentication packets from to chosen AP to the chosen client and vice versa, it will cause them to disconnect from each other
      Notice that when this file is start running, it will run in the same terminal as the NotEvil.py. A new terminal, that will run fake_ap.py, will be opened in order to continue the attack

Part 2

  • fake_ap.py

    • Step 1: Choosing an interface that will be used for the fake AP
      Here you need to choose the network interface that will be used as the fake AP
      Notice that this network interface needs to be in 'managed mode', and that you cannot choose the same network interface as you choose at the beginning (it is still sending the deauthentication packets in the background)
    • Step 2: Activation of the fake AP
      Here we will start running the fake AP. First, we will create the configuration files using create_conf_files.py. Second, we activate the fake AP
      After the fake AP will start running, the attacked client will be able to connect to it. After the client conected
      Notice that the IP of the fake AP will be - 10.0.0.1 fake AP When the fake AP start running a new terminal, that will run index2.js, will be opened in order to run the web server. More information about the web server will be explained below
      fake AP + web server After checking that the password the client entered is correct, we can turn off the fake AP. We will delete all the configuration files we created, and reset the setting to what was before the attack
      web server
  • create_conf_files.py

    • Here we create the hostapd and dnsmasq configuration files
  • factory_setting.py

    • Delete all the configuration files we created, and reset the setting to what was before the attack

How to run the code

In this part there are 2 options to run the code, either run a full attack (Part 1 + Part 2) or just the fake AP (Part 2)

Option 1 - Full attack (Part 1 + Part 2)

  • Scanning the network for possible APs to attack
  • Choosing AP and client that is connected to the AP
  • Attack them. That is, disconnect them from each other
  • Run the fake AP

In this option the name of the fake AP will be as the name of the choosen AP

In order to run full attack, do as following:

  1. Go to NotEvilTwin/attack folder
  2. Run the command $ python3 NotEvil.py as root: NotEvil
  3. Follow the instructions as in the code
  4. And most importantly, HAVE FUN :)

Option 2 - Fake AP (Part 2)

  • Just run the fake AP

In this option you need to choose the name of the fake AP

In order to run the fake AP, do as following:

  1. Go to NotEvilTwin/attack folder
  2. Run the command $ python3 fake_ap.py <your_fake_ap_name> as root, such that <your_fake_ap_name> is the name of the fake AP:
  3. Follow the instructions as in the code
  4. And most importantly, HAVE FUN :)

Defence Part

Files

Part 3

  • defence.py
    • Step 1: Choosing an interface to put in 'monitor mode'
      Here you need to choose the network interface that will scan for deauthentication packets in your area
      Notice that you need to choose the network interface that can be switched to 'monitor mode'. You may choose the same network interface as you choose at the beginning
    • Step 2: Scanning the network for the AP to defence
      Here you will see all the APs that were found in the network scan, and you need to choose the AP you want to defence. If no AP was found, you can choose either to rescan the network or to quit
    • Step 3: Sniffing the packets and checking for deauthentication attack
      Here we sniff for deauthentication packets that the choosen AP is the source/destination. When we manage to capture 30 deauthentication packets, an alert message will appear. Moreover, we will try capture packets in interval of 60 seconds. In each interval, if we didn't capture 30 packets, we reset the count and start new interval
      Notice that if you want to change the number of packets to capture, you can do it by changing the number in if count==30 in the function stopfilter(x). Also, if you want to change the time of each interval, you can do it by changing the number in if time.time()-start_time > 60 in the function packet_handler(pkt)
    • Step 4: Put the interface back in 'managed mode'
      If any alert message has appeared or you want to stop the scanning for deauthentication packets, we need to switch back the network interface to 'managed mode'

How to run the code

In order to run the defence, do as following:

  1. Go to NotEvilTwin/attack folder
  2. Run the command $ python3 defence.py as root:
  3. Follow the instructions as in the code
  4. And most importantly, HAVE FUN :)

Web Server Part

Files

  • index2.js
    • This is the web server. In general, web server contain one or more websites. A web server processes incoming network requests over HTTP and several other related protocols
      In our case, the web server contain one website, our HTML page. And processes incoming network requests over HTTP only.
    • HTML page
      The HTML that we present to the client is - generateHTML
    • GET method requests
      In general, the GET method requests a representation of the specified resource
      In our case, when then client requesting for a website (any website) there is GET method request, the server will response with the generateHTML to any such a request
      In the server side (attacker side) when there is GET requests, a message will appear informing that the client tried to enter a website
    • POST method requests
      In general, the POST request method requests that a web server accepts the data enclosed in the body of the request message, most likely for storing it
      In our case, when then client enter a password and click the Connect button there is POST method request, the server will response with the new generateHTML (now the variable title has new value) to any such a request
      In the server side (attacker side) when there is POST requests, a message will appear informing that the client entered a new password, the password will be saved in the file passwords.txt

How to run the code

In this part there are 2 options to run the code, either run it and manually check the given password by the client, or run it and automatically check the given password given by the client by using node-wifi
Notice that you can run this file separately to test that it works
If you run it without running the fake_ap.py, no client will be able to access it
If you run fake_ap.py, it will automatically open a new terminal window and run the web server in it

Option 1 - Manually check the password

In order to run and test the web server, do as following:

  1. Go to NotEvilTwin/attack/html folder
  2. Run the command $ node index2.js as root:
  3. Go to your browser and type in the URL http://127.0.0.1 or http://localhost, you should see the HTML page
  4. In the text box enter the password, you can enter a random sequence of letters and numbers just for the test
  5. Go to passwords.txt file and you should see the sequence you entered. You should also see a message with the password in the terminal window
    get pass
  6. If you want to check the password, you can do it manually from another device
  7. And most importantly, HAVE FUN :)

Option 2 - Automatically check the password

In order automatically check the password you will need an extra network interface in 'managed mode'
To run and test the web server, do as following:

  1. Go to NotEvilTwin/attack/html folder
  2. Now you need to do some changes in the index2.js file:
    • Uncomment the line const wifi = require('node-wifi');
    • Uncomment the section const checkPassword = async (password) => { ... };
    • Uncomment the line app.post('/password', async (req, res) => {
    • Comment the line app.post('/password', (req, res) => {
    • Uncomment the line const ans = await checkPassword(password);
    • Uncomment the line title = ans ? 'Great succeess :)' : 'The password is incorrect. :(';
    • Comment the line title = "Authenticating...\n If you wait more than 1min. the password is INCORRECT."
    • Don't forget to SAVE the file
  3. If you are running fake_ap.py, you also need to do some changes in the fake_ap.py file:
    • In the function run_fake_ap(), change the line
      os.system('gnome-terminal -- sh -c "node html/index2.js"')
      to
      os.system('gnome-terminal -- sh -c "node html/index2.js <iface> "+ essid + "'), such that <iface> is the extra network interface
  4. If you are not running fake_ap.py, run the command $ node index2.js <iface> <ssid> as root, such that <iface> is the extra network interface, and <ssid> is the name of the AP you want to try to connect to:
  5. Go to your browser and type in the URL http://127.0.0.1 or http://localhost, you should see the HTML page
  6. In the text box enter a password, if you want the test the checking password part you may want to enter the correct password to the <ssid>, and an incorrect password
  7. A related message, whether the password was correct or incorrect, will appear at the top of the presented HTML
  8. Go to passwords.txt file and you should see the passwords you entered. You should also see a messages with the passwords in the terminal window
  9. And most importantly, HAVE FUN :)

Common errors and Suggested solutions

Attack and Defence

  • Error for "Set Frequency":
    This happens when you trying to do something that requires the network interface to be in 'monitor mode', but for some reason the network interface is no longer in 'monitor mode'
    Here are some reasons why it can happen and suggested solutions:
    • There are 3 files that use the 'monitor mode': NotEvil.py, deauth.py, and defence.py. You ran 2 (or 3) of them at the same time, and you use the same network interface in 'monitor mode'. If one program ended, before the other, and it switched the network interface back to 'managed mode', the other program still trying to use the network interface in 'monitor mode'
      If you have another external network interface that can be switched to 'monitor mode', it is recommended to use separated network interface. Another option is to pay attention not to finish one program before the other, so it would not switch the network interface back to 'managed mode'
    • The network interface is connected to some wireless network, and you are trying to switch it to 'monitor mode'
      Disconnect the network interface from the network and press "Forget Connection/Network"

Web Server

  • Port 80 aleady in use:
    This probably happen because you have another web server (Apache, IIS, etc.) that is in use at the moment, and it is using port: 80
    You need to stop it's service. For example, if you have Apache in use, you need to run the command $ sudo service apache2 stop

About

Evil Twin Tool Attack with Captive Portal on scapy


Languages

Language:Python 88.4%Language:JavaScript 10.4%Language:Shell 1.2%