All Projects → anotherik → RogueAP-Detector

anotherik / RogueAP-Detector

Licence: MIT license
Rogue Access Point Detector

Programming Languages

python
139335 projects - #7 most used programming language
shell
77523 projects

Projects that are alternatives of or similar to RogueAP-Detector

Probequest
Toolkit for Playing with Wi-Fi Probe Requests
Stars: ✭ 167 (+496.43%)
Mutual labels:  scapy, wifi-security
Wall-of-Shame
A framework for capturing user credentials and sensitive device information.
Stars: ✭ 57 (+103.57%)
Mutual labels:  wifi-security
gcnn keras
Graph convolution with tf.keras
Stars: ✭ 47 (+67.86%)
Mutual labels:  networks
TensorFlow-Autoencoders
Implementations of autoencoder, generative adversarial networks, variational autoencoder and adversarial variational autoencoder
Stars: ✭ 29 (+3.57%)
Mutual labels:  networks
pathpy
pathpy is an OpenSource python package for the modeling and analysis of pathways and temporal networks using higher-order and multi-order graphical models
Stars: ✭ 124 (+342.86%)
Mutual labels:  networks
Osmnx
OSMnx: Python for street networks. Retrieve, model, analyze, and visualize street networks and other spatial data from OpenStreetMap.
Stars: ✭ 3,357 (+11889.29%)
Mutual labels:  networks
gephi-tutorials
Open and collaborative tutorials for Gephi
Stars: ✭ 97 (+246.43%)
Mutual labels:  networks
termux-wifi
Bash script which installs and runs the Fluxion tool inside Termux, a wireless security auditing tool used to perform attacks such as WPA/WPA2 cracking and MITM attacks.
Stars: ✭ 406 (+1350%)
Mutual labels:  wifi-security
Auto-Besside-Capturer
Capture WPA handshakes, using besside-ng. Auto upload to http://wpa-sec.stanev.org for cracking the password.
Stars: ✭ 28 (+0%)
Mutual labels:  wifi-security
noisy-networks-measurements
Noisy network measurement with stan
Stars: ✭ 42 (+50%)
Mutual labels:  networks
flowmanager
An SDN application that gives its user the ability to control flows in an OpenFlow network without coding.
Stars: ✭ 60 (+114.29%)
Mutual labels:  networks
MLExp
arxiv.org/abs/1801.07710v2
Stars: ✭ 32 (+14.29%)
Mutual labels:  networks
Crackmapexec
A swiss army knife for pentesting networks
Stars: ✭ 5,445 (+19346.43%)
Mutual labels:  networks
ComputerNetworks-unipd2018
Tips and resources to easily pass the "Computer Networks" practical exam ("Reti di calcolatori") in Padua
Stars: ✭ 21 (-25%)
Mutual labels:  networks
http-request-capture
A simple tool for capturing http requests.
Stars: ✭ 18 (-35.71%)
Mutual labels:  scapy
RaspberryPi-Packet-Sniffer
An HTTP and HTTPS sniffing tool created using a Raspberry Pi
Stars: ✭ 79 (+182.14%)
Mutual labels:  networks
ManTraNet-pytorch
Implementation of the famous Image Manipulation\Forgery Detector "ManTraNet" in Pytorch
Stars: ✭ 47 (+67.86%)
Mutual labels:  networks
landscape-of-programming
This repo aim to show you what to learn on the way to excellence.
Stars: ✭ 67 (+139.29%)
Mutual labels:  networks
PyNets
A Reproducible Workflow for Structural and Functional Connectome Ensemble Learning
Stars: ✭ 114 (+307.14%)
Mutual labels:  networks
how attentive are gats
Code for the paper "How Attentive are Graph Attention Networks?" (ICLR'2022)
Stars: ✭ 200 (+614.29%)
Mutual labels:  networks

RogueAP Detector

rogueAP Detector is an open source tool to detect Wi-Fi Rogue Access Points, covering the most commonly known attacks. This tool is a modular framework composed of Scanners, Detectors and Actuators, which are responsible for scanning for available APs, apply a set of heuristics to detect them, and apply a defensive mechanism.

RogueAP Detector_1

Modules

Scanners: Methods to scan the network  
Detectors: Set of passive detectors to identify RogueAP types  
Actuators: Set of active detectors to identify RogueAP types  

Usage

./rogueAP_detector.py

Options:

-i interface		-> interface to monitor the network  
-im interface		-> interface for active mode  
-p profile              -> name of the profile to load  
-s scan_type            -> name of scanning type (iwlist, scapy)  
-h hive_mode		-> creates an AP (configured in profiles/rogueAP.txt) 
-d deauth               -> deauthenticates users from target AP  
-wifi_attacks_detect    -> detects deauthentication and pmkid attacks  
-a active_mode		-> activates random probe requests  

Examples:

 Scan for RAPs without a profile - (iwlist mode)  
./rogueAP_detector.py -i iface -s iwlist  

 Scan for RAPs using a profile - (iwlist mode)  
./rogueAP_detector.py -i iface -s iwlist -p example_profile.txt  

 Scan for RAPs using a profile - (scapy mode)  
./rogueAP_detector.py -i iface -s scapy -p example_profile.txt  

 Scan for RAPs with karma detect active mode enabled - (iwlist mode)  
./rogueAP_detector.py -i iface1 -im iface2 -s iwlist -a  

 Scan for RAPs using a profile and karma detect active mode enabled - (iwlist mode)  
./rogueAP_detector.py -i iface1 -im iface2 -s iwlist -p profile.txt -a  

 Create a RAP  
./rogueAP_detector.py -im iface -h  

 Deauthenticate defensive mechanism mode  
./rogueAP_detector.py -im iface -d  

 Deauthentication and PMKID attacks detection  
./rogueAP_detector.py -im iface -wifi_attacks_detect  

Detecting Evil Twin, Multi-Channel, Different Encryption and Recently Created Rogue APs:

RogueAP Detector_2

Validate Free WiFis and Detecting Karma Attacks:

RogueAP Detector_3

PMKID Attack Detection:

RogueAP Detector_4

PMKID and Deauthentication Attacks Detection:

RogueAP Detector_5

Dependencies

python2.7
scapy
wireless-tools
iw

To install the dependencies, run: ./dependencies.sh

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].