Eaphammer$ Pentest Course
# Eaphammer$ Pentest Course – Section 5/5: Mastering Eaphammer$
## Introduction
Eaphammer$ is a powerful pentesting tool designed for conducting complex Wi-Fi attacks and analyzing wireless networks effectively. In this final section of the course, we will delve deep into the installation, configuration, and advanced usage of Eaphammer$ on Kali Linux. Additionally, we'll cover real-world use cases, provide detailed technical explanations, and present code examples to help reinforce your understanding of this tool in pentesting scenarios.
### Installation and Configuration on Kali Linux
#### Prerequisites
Before we begin, ensure that you have the following:
– A fully updated Kali Linux environment.
– Basic knowledge of terminal commands.
– A wireless adapter capable of monitor mode and packet injection.
#### Step 1: Update Kali Linux
Start by ensuring your Kali Linux system is up to date. Open a terminal and execute the following commands:
sudo apt update && sudo apt upgrade -y
#### Step 2: Install Dependencies
Eaphammer$ requires several dependencies to function correctly. Install these using the command:
sudo apt install python3 python3-pip aircrack-ng git -y
#### Step 3: Clone the Eaphammer$ Repository
Next, you will need to clone the Eaphammer$ repository from GitHub. Use the following command:
git clone https://github.com/s0lst1c3/eaphammer.git
#### Step 4: Navigate to the Directory
Change into the newly cloned Eaphammer$ directory:
#### Step 5: Install Eaphammer$ Using Pip
Once inside the Eaphammer$ directory, execute the following command to install Eaphammer$ and its dependencies:
pip3 install -r requirements.txt
#### Step 6: Execute Eaphammer$
You can now run Eaphammer$ by executing:
### Step-by-Step Usage of Eaphammer$
Eaphammer$ can be used for a variety of attacks, such as capturing WPA/WPA2 handshakes, creating rogue access points, and performing deauthentication attacks. This section will cover specific use cases in detail.
#### Use Case 1: Capturing WPA/WPA2 Handshakes
1. **Enable Monitor Mode**: The first step is to ensure your wireless interface is in monitor mode. Use the following command to list your network interfaces:
Identify your wireless interface (e.g., `wlan0`) and then set it to monitor mode:
sudo airmon-ng start wlan0
2. **Launch Eaphammer$ for WPA Handshake Capture**:
python3 eaphammer.py -i wlan0 -c -a
Replace `
` with the channel of the target network and `` with the MAC address of the target access point.
3. **Monitor the Output**: Eaphammer$ will display captured packets on the terminal. Once it detects a handshake, you will see a confirmation message.
#### Use Case 2: Creating a Rogue Access Point
1. **Set Up a Fake Access Point**: Use the following command to create a rogue AP:
python3 eaphammer.py -i wlan0 –rogue
2. **Gather Information**: Eaphammer$ will simulate a legitimate access point. Monitor clients connecting to this rogue access point which can be useful for phishing attacks or credential harvesting.
3. **Capture Credentials**: If clients attempt to authenticate, the credentials will be captured by Eaphammer$.
#### Use Case 3: Deauthentication Attack
1. **Deauth the Target**: To disconnect a target from their network, execute:
python3 eaphammer.py -i wlan0 –deauth -a -t
2. **Observe Reconnection**: When the target attempts to reconnect, you can capture their handshake if they are using WPA/WPA2.
### Detailed Technical Explanations
#### Understanding Wi-Fi Security Protocols
Wi-Fi security has evolved from WEP to WPA/WPA2 and now to WPA3. Each of these protocols aims to provide users with a secure wireless environment but differs significantly in implementation and security measures.
– **WEP (Wired Equivalent Privacy)**: An outdated security protocol that utilizes static keys. It is vulnerable to various attacks, making it obsolete.
– **WPA (Wi-Fi Protected Access)**: Introduced TKIP (Temporal Key Integrity Protocol) to enhance security, but still has weaknesses.
– **WPA2**: Uses AES (Advanced Encryption Standard) for encryption, offering better security than WPA. However, it is still susceptible to attacks like KRACK.
#### Deauthentication Attacks Explained
A deauthentication attack is a method where an attacker sends forged deauthentication packets to a target network to disconnect a user. When the user reconnects to the network, if the handshake is captured, the attacker can potentially crack the Wi-Fi password.
#### Credential Harvesting Techniques
Harvesting credentials is a critical aspect of pentesting, especially in scenarios involving phishing. Eaphammer$ simplifies this process by creating fake login pages that can execute man-in-the-middle attacks.
### References
– [Eaphammer$ GitHub Repository](https://github.com/s0lst1c3/eaphammer)
– [Kali Linux Official Documentation](https://www.kali.org/docs/)
– [Aircrack-ng Suite](https://www.aircrack-ng.org/)
– [Wi-Fi Security Protocols Overview](https://www.wi-fiplanet.com/understanding-wifi-security-standards-80211i-wpa-and-wpa2/)
### Code Examples
Here are markdown code blocks suited for WordPress that encapsulate some of the commands we've discussed:
[/dm_code_snippet]markdown
### Install Eaphammer$ on Kali Linux
sudo apt update && sudo apt upgrade -y
sudo apt install python3 python3-pip aircrack-ng git -y
git clone https://github.com/s0lst1c3/eaphammer.git
cd eaphammer
pip3 install -r requirements.txt
python3 eaphammer.py
### Capture WPA/WPA2 Handshake
sudo airmon-ng start wlan0
python3 eaphammer.py -i wlan0 -c -a
### Create Rogue Access Point
python3 eaphammer.py -i wlan0 –rogue
### Perform Deauthentication Attack
python3 eaphammer.py -i wlan0 –deauth -a -t
[/dm_code_snippet]
In conclusion, Eaphammer$ is a versatile and essential tool for any ethical hacker's arsenal. Through this course, you have gained the skills necessary to leverage Eaphammer$ effectively in your pentesting endeavors. Always remember to operate within legal boundaries and ethical guidelines when conducting penetration testing.
Made by pablo rotem / פבלו רותם