A proof of concept project to detect an stop Evil Twin Attacks.
Scans the wireless airspace and looks for wireless access points that may be imitating a legitmate one (this is called an evil twin attack). If an Evil Twin is discovered then it will be instantly flooded with deauth frames preventing any clients from connecting to it.
- No channel hopping
- Deauthing never stops even if the access point goes away
- Threads opened by the
Deauther
are not stopped properly - Observers of the
Scanner
object are not stopped properly
- Fix the known issues
- Allow white listing of multiple wifi access points
- Allow the use of multiple wifi interfaces to limit the amount of channel hopping a single interface needs to do
- Be able to detect and respond to other wifi events not just beacons
This projects requires Python 3.5 or greater.
-
Clone the repo:
git clone https://github.com/frozenjava/TwinHunter.git
-
Install the requirements
cd TwinHunter pip install -r requirements.txt
-
Identify your wireless card with
ifconfig
. Assumingwlan0
for this README.
The remaining steps will need to be run with root privileges.
-
Put your wireless interface into monitor mode
airmon-ng start wlan0
-
Run the script using the WiFi name (ESSID) and a mac address serving that WiFi (BSSID)
chmod +x twinhunter.py ./twinhunter.py --iface wlan0mon --essid home --bssid 00:11:22:33:44:55
Once it successfully discovers the net work you will see a log similar to
Discorvered Accesspoint => BSSID: 00:11:22:33:44:55 | ESSID: home
The process will continue to scan for evil twins. If one is discovered, additional logs will appear
FOUND EVIL TWIN!!! BSSID: 00:11:22:33:44:55 | ESSID: home