1 00:00:00,650 --> 00:00:08,080 All right, so wi fi pumpkin is a powerful framework for rogue access point attack written in Python. 2 00:00:08,780 --> 00:00:12,260 It will allow and it actually offers security. 3 00:00:12,260 --> 00:00:19,310 Researchers read teamers and reverse engineers to mount a wireless network in order to conduct a man 4 00:00:19,310 --> 00:00:20,210 in the middle attack. 5 00:00:21,120 --> 00:00:25,470 So firstly, Wi-Fi pumpkin was written with Python two seven. 6 00:00:26,930 --> 00:00:35,270 So it had a user interface, but it deprecated and wi fi pumpkin version three is now what we use. 7 00:00:36,870 --> 00:00:43,590 So once you start up the tool with Souto, you will be presented with an interactive session, kind 8 00:00:43,590 --> 00:00:50,370 of like the Métis boy framework where you can abler disable modules, plug ins and proxy configure the 9 00:00:50,370 --> 00:00:51,280 access point. 10 00:00:52,560 --> 00:01:01,440 So let's start to install let's go to Kaui or the browser or search Wi-Fi pumpkin three for the get 11 00:01:01,440 --> 00:01:02,310 harbage. 12 00:01:08,030 --> 00:01:09,710 Click on the Wi-Fi pumpkin three. 13 00:01:11,130 --> 00:01:14,850 And let's, uh, let's take a quick look at the GitHub page. 14 00:01:18,920 --> 00:01:24,470 So here you've got the main features we can perform, not only rogue access point attacks, but also 15 00:01:24,470 --> 00:01:27,920 the other different network attacks are listed, OK? 16 00:01:30,570 --> 00:01:37,080 All right, so we have the appropriate platform for this tool to work, so we'll click for the installation. 17 00:01:38,400 --> 00:01:42,630 Scroll down a little bit for the installation procedure for callisthenics. 18 00:01:47,130 --> 00:01:49,320 Now, let's install the dependencies. 19 00:01:57,810 --> 00:02:00,210 So switch users to root and run the command. 20 00:02:03,830 --> 00:02:06,830 So here you can notice that I already have the dependencies. 21 00:02:13,660 --> 00:02:16,570 OK, so the next step is to clone the repository. 22 00:02:23,690 --> 00:02:26,330 We'll change directory to wi fi, punkin. 23 00:02:27,840 --> 00:02:31,230 The other dependancy is Picart five. 24 00:02:37,800 --> 00:02:39,630 Copy this command, paste it. 25 00:02:46,280 --> 00:02:49,940 Now we can check if the installation is successful by running this command. 26 00:02:56,620 --> 00:02:58,330 All right, so we can see it's done. 27 00:03:03,170 --> 00:03:05,030 So we'll install the setup file. 28 00:03:22,740 --> 00:03:25,290 And that shows the installation is complete. 29 00:03:27,370 --> 00:03:29,530 So let's run wi fi pumpkin three. 30 00:03:33,460 --> 00:03:38,590 Oh, I got an errand to do, so I'm going to look at the requirements file. 31 00:03:45,550 --> 00:03:51,670 So I need this package, but to make sure that I have all the packages, I'll just run the PIP install, 32 00:03:51,670 --> 00:03:53,470 dash our requirements. 33 00:04:04,850 --> 00:04:07,730 All right, so now I'm going to run wi fi pumpkin again. 34 00:04:11,470 --> 00:04:14,160 Oh, I forgot to set it up again. 35 00:04:14,670 --> 00:04:15,320 That's OK. 36 00:04:16,420 --> 00:04:20,200 So after getting the new packages, we'll just set it up again. 37 00:04:21,230 --> 00:04:22,300 So he sent out OK. 38 00:04:23,780 --> 00:04:30,830 All right, so I have shown you and I have you know, I have just shown you I mean, to show you these 39 00:04:30,830 --> 00:04:32,390 kinds of little quirks that happen. 40 00:04:32,390 --> 00:04:39,230 Right, but we've now successfully installed Wi-Fi pumpkin three, and we are ready to create a fake 41 00:04:39,230 --> 00:04:39,980 access point. 42 00:04:40,430 --> 00:04:42,980 So open up the terminal screen. 43 00:04:46,240 --> 00:04:54,550 And will check the mode of Wi-Fi interface so this time don't have switches to monitor mode, but just 44 00:04:54,550 --> 00:04:56,110 run Wi-Fi pumpkin three. 45 00:04:57,420 --> 00:05:00,060 That's type help to see the available commands. 46 00:05:01,410 --> 00:05:04,470 OK, so it gives us the access point commands. 47 00:05:08,840 --> 00:05:16,040 So to create a fake access point, the commands that we need to write are set interface w land zero, 48 00:05:17,030 --> 00:05:25,100 set aside Hacker Academy and the SS IDs should have the same name as the access point for which you 49 00:05:25,100 --> 00:05:26,660 want to create a rogue access point. 50 00:05:28,130 --> 00:05:34,470 So wi fi pumpkin has three types of proxies to redirect all traffic with IP tables. 51 00:05:35,260 --> 00:05:37,130 I'm not going to use a proxy for now. 52 00:05:38,960 --> 00:05:40,940 So I'm going to set proxy, no proxy. 53 00:05:42,260 --> 00:05:44,510 Ignore the pie DNS server. 54 00:05:45,640 --> 00:05:49,570 So we we're not going to see any log-in consume. 55 00:05:51,710 --> 00:05:52,520 And start. 56 00:05:54,240 --> 00:05:56,430 So fake access point is created. 57 00:05:59,160 --> 00:06:04,290 And the request packets are coming from the clients and they will appear on the console. 58 00:06:06,090 --> 00:06:08,310 I connect to the access point with my phone. 59 00:06:09,760 --> 00:06:14,350 As you can see, the sniffer in Wi-Fi pumpkin is showing the traffic. 60 00:06:16,370 --> 00:06:21,620 So if you type clients in the console, you will see the connected clients on a table. 61 00:06:23,780 --> 00:06:25,430 All right, so now press cue to quit. 62 00:06:27,210 --> 00:06:32,100 We'll look at the processes in the background with the jobs module. 63 00:06:37,810 --> 00:06:40,180 So to stop the access point, just type stop. 64 00:06:42,170 --> 00:06:45,020 All right, so let's look at the available proxy's and plug ins. 65 00:06:46,520 --> 00:06:54,410 So proxy's work by intercepting a request, modifying the request if necessary, then handling or forwarding 66 00:06:54,410 --> 00:06:56,160 the request to its destination. 67 00:06:57,200 --> 00:07:04,070 So when a user connects to the access point, the transparent proxy intercepts the request before passing 68 00:07:04,070 --> 00:07:05,240 it on to the provider. 69 00:07:06,500 --> 00:07:13,610 So the plug ins basically add features and Wi-Fi pumpkin provides facilities to develop our own plug 70 00:07:13,610 --> 00:07:13,910 ins. 71 00:07:16,410 --> 00:07:22,440 Now, if you have a look at the documentation and have a few minutes on your hands, you can have a 72 00:07:22,440 --> 00:07:28,890 look through Wi-Fi pumpkin, and you can perform very complicated attacks using these features.