• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

Tools FAPA - Fake Access Point Attack Tool [OPEN SOURCE]

dEEpEst

☣☣ In The Depths ☣☣
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
Joined
Mar 29, 2018
Messages
13,861
Solutions
4
Reputation
32
Reaction score
45,552
Points
1,813
Credits
55,350
‎7 Years of Service‎
 
56%

FAPA - Fake Access Point Attack Tool​

Overview​

The Fake Access Point Attack Tool is a proof-of-concept (PoC) designed to demonstrate the risks associated with connecting to "free Wi-Fi" access points. This tool simulates a malicious access point to lure victims and then allows you to execute various attacks such as Man-In-The-Middle (MITM), phishing, vulnerability scanning, and packet manipulation.

Disclaimer:
This tool is provided for research and educational purposes only. Use it only in environments where you have explicit permission to perform security testing. Unauthorized use on networks without consent is illegal and unethical. By using this tool, you agree that the developers are not responsible for any damage or legal issues that may arise from its misuse.

Features​

  • Fake Access Point Creation:
    Create a malicious access point (Fake AP) using hostapd, dnsmasq, and NAT. This helps demonstrate how easily victims can be lured into connecting to a rogue network.
  • MITM Attacks:
    Perform various MITM attacks using:
    • Bettercap for ARP spoofing.
    • Ettercap for DNS spoofing (with GUI and caplets).
    • Mitmproxy for Proxy MITM.
  • Phishing Portal:
    Deploy phishing scenarios using Wifiphisher to capture credentials and sensitive information.
  • Traffic Sniffing, Injection, and Packet Manipulation:
    Capture, analyze, inject, and manipulate network packets using tools like tcpdump and Scapy.
  • Vulnerability Scanning:
    Scan connected devices for vulnerabilities using Nmap with a customizable set of NSE (Nmap Scripting Engine) script categories and arguments.
  • Client Monitoring:
    Monitor in real-time the devices connected to your Fake AP.
  • Real-Time Notifications:
    Receive notifications about connected clients via a Telegram bot.
  • Reporting:
    Generate and analyze reports in CSV format detailing the outcomes of attacks and scans.
  • Network Configuration Restoration:
    Quickly restore the network configuration to its original state after testing.
  • Future Internationalization:
    Planned support for multiple languages to accommodate researchers worldwide.

Screenshot​

This link is hidden for visitors. Please Log in or register now.


New Version v0.2​


 
Last edited:
Back
Top