Ethical Hacking
Wifi Hacking

Phishing Attack Using WIFI Phisher In Kali Linux

Harminder Singh on November 3, 2018

logo

Want to be a Network Security Expert ?

Learn Network Security from Top Industry Experts

Join now for Early Bird Discounts

Wifiphisher

WiFi-Phisher tool uses “Evil Twin” attack scenario. Same as Evil Twin, the tool first creates a phony wireless Access Point (AP) masquerade itself as the legitimate WiFi AP. It then directs a denial of service (DOS) attack against the legitimate WiFi access point, or creates RF interference around it that disconnects wireless users of the connection and prompts users to inspect available networks. Once disconnected from the legitimate WiFi access point, the tool then force offline computers and devices to automatically reconnects to the evil twin, allowing the hacker to intercept all the traffic to that device. The technique is also known as AP Phishing, WiFi Phishing, Hots potter, or Honeypot AP. These kind of attacks make use of phony access points with faked login pages to capture user’s WiFi credentials, credit card numbers, launch man-in-the-middle attacks, or infect wireless hosts. As soon as the victim requests any web page from the internet, WiFi-Phisher tool will serve the victim a realistic fake router configuration looking page that will ask for WPA password confirmation due to a router firmware upgrade. The tool, thus, could be used by hackers and cyber criminals to generate further phishing and man-in-the-middle attacks against connected users.

Harminder Singh on November 3, 2018

You Might Also Like

Paytm founder lost private data and almost lost Rs 20 crore.

Ethical Hacking Data Theft Paytm founder lost private data and almost lost Rs 20 crore. Harminder ...

Phishing Attack Using WIFI Phisher In Kali Linux

Ethical Hacking Wifi Hacking Phishing Attack Using WIFI Phisher In Kali Linux Harminder Singh on ...

How Hackers Steal Your Credit/Debit Card (Case Study)

Ethical Hacking Social Engineering How Hackers Steal Your Credit/Debit Card (Case Study) Harminder ...

Organize Our Workshop At Your College

Workshop form

  • Select workshop
  • Ethical Hacking & Information Securities
  • Cyber Forensics
  • Artificial Intelligence
  • Machine Learning
  • Big Data
  • Robotics
  • Internet of Things

© 2014 Axpino Technologies

HELP & INFORMATION

Help
Verify Certificate
Complains & Suggestions

Close Menu
× Instant Support