Rogue Access Point Toolkit : hostapd-mana

2018-08-18T23:01:10
ID N0WHERE:27879
Type n0where
Reporter N0where
Modified 2018-08-18T23:01:10

Description

hostapd-mana is a featureful rogue wifi access point tool. It can be used for a myriad of purposes from tracking and deanonymising devices (aka Snoopy), gathering corporate credentials from devices attempting EAP (aka WPE) or attracting as many devices as possible to connect to perform MitM attacks.

hostapd-mana acts as an access point, this means it needs a wireless device that supports master mode. This is different from the monitor mode or frame injection support required for projects such as aircrack.

Devices known to work

Three cards that have been confirmed to work:

  • Ubiquiti SR-71 (not made anymore, chipset AR9170, driver carl9170 )
  • “Old” Alfa Black AWUS036NHA (chipset Atheros AR9271, buy one ). This is still my faithful fall back.
  • TP-Link TL-WN722N (chipset Atheros AR9271)

Devices that partially work

  • Alfa Orange AWUS052NH (chipset Ralink RT3572). This was my new favourite, but recently my mac disables the USB port regularly for attempting to use too much power, even with the dual USB cable plugged in, at random intervals, making it unreliable. I’ve tested with multiple NICs.

Devices known not to work

  • Original Alfa Silver AWUS036H. While this supports monitor mode and frame injection, it does not support master mode.
  • “New” Alfa Black AWUS036ACH (chipset Realtek RTL8812AU). This is particularly sneaky, as it supports master mode, and will create an AP, and attacks such as WPE/EAP interception will work as they function at a RADIUS level. However, mana changes to probe behaviour will not, as that is handled by the chip’s firmware.

Rogue Access Point Toolkit : hostapd-mana Wiki

Rogue Access Point Toolkit : hostapd-mana Download