-
Notifications
You must be signed in to change notification settings - Fork 8
/
README.md
97 lines (57 loc) · 1.91 KB
/
README.md
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
# wifi-agent
<h1 align="center"> wifi-agent </h1>
<h2 align="center"> Rogue access point. </h2>
<p align="center">
<img src="logo/logo.png"> </br>
</p>
<h3>
The program is made for educational purposes only for to see how the rogue access point method works.
Any unnecessary use of the program is prohibited and the manufacturer has no responsibility for any illegal use by anyone.
Use the tool at your own risk and avoid any sloppy actions.
</h3>
<p>
<h4> Installation Instractuions </h4>
Installation on Gnu / Linux OS. </br>
On terminal </br>
```diff
sudo su
```
```diff
git clone https://github.com/makdosx/wifi-agent.git
```
```diff
chmod -R 777 wifi-agent
```
```diff
cd wifi-agent
```
```diff
bash wifiagent.sh
```
</br> </br>
</p>
<h3>
Feautures and Properties.
</h3>
<p>
Wifi Agent is a modern and advanced cyber security program for computers with Gnu / Linux operating systems and is related to the creation of fake access points and phishing. </br>
It can create captive portal by redirecting users connected to the wireless network to give their credentials for take access to the internet. </br>
It has the ability to forge domain names to redirect the user's requests to the capture portal and also has the ability to insert malware into the capture portal for downloaded by users.
</p>
</br>
<img src="sc/diagram.png">
<br/> <br/> <br/>
<p>
Details
1) Phishing and spoofing
Attack through automatically cloned services targeting user credentials <br/>
and spoofing any domain name for go to captive portal.
It has 12 ready cloned captive portals, including operating systems login, social networks, e-mails etc. </br>
<img src="sc/sc1.png">
<br/> <br/> <br/>
2) Malware
Insert malware on the captive portal. <br/>
Attack by importing any malware you want so that it can be downloaded by the user.
<img src="sc/sc2.png"> </br> </br>
<img src="sc/sc3.png">
</p>