Today
no one did not use a wireless network in his daily life, use of this
type of connection has become more famous and used widely, especially
because they provide this technique of easy access, as well as connect
the largest possible number of devices and to cover long distances.
Of course, this widespread technology Wi-flowing saliva hackers
permanent and methods to penetrate this type of networking technologies
and there .aka these tools are Wifiphisher tool.
This new tool launched by George Chatzisofroniou security researcher under the name of Greek Wifiphisher.
It is a tool to penetrate wireless networks, which use intelligent
fraud and style in a new way far from the traditional stereotype known
methods. The most beautiful tool that
integrates several technologies in the field of penetration as well as
many of the weaknesses in the protocols used in networks.
How Wifiphisher works and why is it dangerous?
A common way to get through the Wi-Fi networks for a long time is
Alaatmadh mainly on the dictionary, which includes hundreds of thousands
of random words and tested to gain access to the password for the
router or Alrotr.ohma known attack "brute force" and take a long time.
The new method on which they depend Wifiphisher are completely different and more intelligent. It can Tl_khasaha in the following:
The tool is to reproduce your access point Access Point, and offers new point counterfeit
of the victim will be "Kaltoom evil", while at the same time play the
instrument Btid blocking DoS service attack on the router to disable the original
point of contact, making the victim believe there authentication and
access problems to the point of origin Contact and thus the tool
Bajabbark clever and deceptive manner to the contact point counterfeit
which would be quite similar to the original (and you will be sent as
well as Page fake tool to ask for the password) and the nature of the
user's case would be reassuring and will not feel any difference thus
will enter the password voluntarily; the latter sent to your attacker.
also referred to as the tool that the attack "Deauthentication" to separate all related to the original point communication devices, forcing them to call fake point.
Once you get the original password, this point contact counterfeit or
"evil twin" can continue to work as the connection broker (between the
original arrival point and other users), the sense will be connected to
the Internet like you are connected to the original point of contact!.
Yes, and this may lead to steal passwords and other information and
passing on this network words, and this is very dangerous too.
Wifiphisher
certainly can be considered intelligent combination of social
engineering (the most common method of penetration), with a simple
application that combines many of the techniques and methods.
And 2 this tool Kali Linux require network cards, and one of them is capable of injection. You can download the tool and experience, as you can access all of the information about them through this link.
0 comments: