Public | Automated Build

Last pushed: 3 months ago
Short Description
docker run -ti --rm --privileged --net=host syakesaba/hostapd-wpe
Full Description

hostapd-wpe

Orig: https://github.com/aircrack-ng/aircrack-ng/tree/master/patches/wpe

How to use

Docker

git clone https://github.com/syakesaba/hostapd-wpe.git;
cd hostapd-wpe;
docker build . -t hostapd-wpe
docker run -ti --rm --privileged --net=host hostapd-wpe

Debian , Ubuntu

apt-get update;
apt-get install -y openssl libssl-dev libnl-3-dev libnl-genl-3-dev build-essential git wget libnfnetlink-dev libsqlite3-dev;
git clone https://github.com/syakesaba/hostapd-wpe.git;
cd hostapd-wpe;
wget https://w1.fi/releases/hostapd-2.6.tar.gz;
tar xzvf hostapd-2.6.tar.gz;
patch -p0 < hostapd-wpe-2.6-user.patch;
cd hostapd-2.6/hostapd;
make all;
cp hostapd-wpe ../../;
cd ../../certs;
./bootstrap;
cd ..;
cp ./confs/hostapd-wpe.conf .;
# assuming your wireless interface is 'wlan1'.
./hostapd-wpe hostapd-wpe.conf;
# enjoy!
# tail -f ./hostapd-wpe.log

Enjoy Dummy SSL Certificate

Generate

  1. Edit .cnf files in ./certs
  2. execute ./bootstrap in ./certs
  3. specify certificates created in hostapd's config file

Delete

  1. execute 'make destroycerts' in ./certs

Hostapd-wpe as RougeAP Spoofing

The syntax of a hostapd-wpe's configuration file is same as usual hostapd's one.
Let hostapd-wpe to use same ESSIDs Authentications and Encryptions of AP to spoof.
Edit and create your hostapd-wpe.conf .

Notes

  • don't delete eap_user "t", it's special user to keep bypassing TLS phase 1 anytime.
  • this wll offer ALL EAP Types to user "t" but if you don't want to restrict what EAP types to offer users.

Videos

Docker Pull Command
Owner
syakesaba
Source Repository

Comments (0)