WireSpy enables the automation of various WiFi attacks to conduct Man-In-The-Middle-Attacks (MITMAs).
WireSpy allows attackers to set up quick honeypots to carry out MITMAs. Monitoring and logging functionality is implemented in order to keep records of the victims' traffic/activities. Other tools can be used together with Wirespy to conduct more advanced attacks.
Two type of attacks are supported at the moment:
- Evil twin: Force victims to auto-connect to the honeypot by spoofing a "trusted" hotspot (clone an existing access point and de-authenticate its users to force them to transparently connect to the spoofed honeypot).
- Honeypot: Set up a simple rogue hotspot and wait for clients to connect.
- Capture victims' traffic.
- MAC address spoofing.
- Set-up honeypot and evil twin attacks.
- Show the list of in range access points.
- Wireless adapter|card|dongle power amplification.
-
Set as
executable
:chmod +x wirespy.sh
-
Execute as
root
:sudo ./wirespy.sh
-
Type
help
to get started.Attacks: eviltwin > launch an evil twin attack honeypot > launch a rogue access point attack Commands: clear > clear the terminal help > list available commands quit|exit > exit the program apscan > show all wireless access points nearby leases > display DHCP leases powerup > power wireless interface up (may cause issues) start capture > start packet capture (tcpdump) stop capture > stop packet capture (tcpdump) status > show modules status
- Add WPA/WPA2 support for honeypot.
- Bash autocompletion.
- Optimise the source code.
- Improve the stability.
- Improve the UI (e.g. uniformise the style and colors).
- Show the status of processes running in the background.
- Validate all user inputs against regexes.
This script was developed in the context of my master thesis work in June 2015.
The project was presented on Pentester Academy TV's toolbox in 2017:
Work on a new improved version has commenced in 2018.
If you want to support this project and appreciate the time invested in developping, maintening and extending it; consider donating toward my next cup of coffee. ☕
It is easy, all you got to do is press the Sponsor
button at the top of this page or alternatively click this link. 💸
Found a bug? I would love to squash it! 🐛
Please report all issues on the GitHub issues tracker.
You would like to contribute to better this project? 🤩
Please submit all PRs
on the GitHub pull requests tracker.
See LICENSE.