• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

Hacking FAPA - Fake Access Point Attack v0.2

dEEpEst

☣☣ In The Depths ☣☣
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
Joined
Mar 29, 2018
Messages
13,862
Solutions
4
Reputation
32
Reaction score
45,552
Points
1,813
Credits
55,350
‎7 Years of Service‎
 
56%

FAPA Tool Screenshot.

Fake Access Point Attack v0.2​

  • Release 0.2

What's new?​

  • Check the version to update to the latest version
  • Comprehensive translation into English for internationality
  • Color is added for easy understanding

About​


The Fake Access Point Attack Tool is a proof-of-concept (PoC) designed to demonstrate the risks associated with connecting to "free Wi-Fi" access points. This tool simulates a malicious access point to lure victims and then allows you to execute various attacks such as Man-In-The-Middle (MITM), phishing, vulnerability scanning, and packet manipulation.


Features​

  • Fake Access Point Creation:
    Create a malicious access point (Fake AP) using hostapd, dnsmasq, and NAT. This helps demonstrate how easily victims can be lured into connecting to a rogue network.
  • MITM Attacks:
    Perform various MITM attacks using:
    • Bettercap for ARP spoofing.
    • Ettercap for DNS spoofing (with GUI and caplets).
    • Mitmproxy for Proxy MITM.
  • Phishing Portal:
    Deploy phishing scenarios using Wifiphisher to capture credentials and sensitive information.
  • Traffic Sniffing, Injection, and Packet Manipulation:
    Capture, analyze, inject, and manipulate network packets using tools like tcpdump and Scapy.
  • Vulnerability Scanning:
    Scan connected devices for vulnerabilities using Nmap with a customizable set of NSE (Nmap Scripting Engine) script categories and arguments.
  • Client Monitoring:
    Monitor in real-time the devices connected to your Fake AP.
  • Real-Time Notifications:
    Receive notifications about connected clients via a Telegram bot.
  • Reporting:
    Generate and analyze reports in CSV format detailing the outcomes of attacks and scans.
  • Network Configuration Restoration:
    Quickly restore the network configuration to its original state after testing.
  • Future Internationalization:
    Planned support for multiple languages to accommodate researchers worldwide.

Download​

This link is hidden for visitors. Please Log in or register now.


NEW VERSION

 
Last edited:
Back
Top