Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up

Wifi sniffing and hijacking tool

NotificationsYou must be signed in to change notification settings

flankerhqd/wifimonster

Repository files navigation

Wifi sniffing and hijacking tool

Currently the tool is able to

  • sniff cookie and form passwords from open wifi in monitor mode
  • one-click to launch a browser with sniffed cookie

This tool does not require ARP attack, just silent sniffing, thus invisible to victim. Besides, the sniffing does not requireone to associate AP, making it even more diffcult to detect.

#Requirements:

  • PyQT >=4
  • Scapy >=2.0

Tested on Backtrack5 and Mountain Lion

#Usage:

e.g: python cookiemonster.py -i en0 [-c 1]

File / Interface    -i --interface <interface>    Choose specified interface    -f --file <filename>         Choose specified filename    -c --channel <channel>      Choose specified channel (For Mac OS X only)

On poping cookie window, right click onuseragent items and select "launch attack" to open a browser using sniffed cookie.Sniffed passwords are stored inmonsterCookie.log

#Demo Screenshots:

The following cookies and screenshots were captured in Wooyun Summit 2014 by sniffing hotel open wifi.

CookiesAttack launched

About

Wifi sniffing and hijacking tool

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages


[8]ページ先頭

©2009-2025 Movatter.jp