s0lst1c3 / eaphammer

Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.
GNU General Public License v3.0
2.11k stars 307 forks source link

View ESSID beacon info for credentials #195

Open gusgorman402 opened 2 years ago

gusgorman402 commented 2 years ago

In known-beacon attack, is there a way to see what credentials belong to which beacon? How do we know what network the outputted credentials belong too?

s0lst1c3 commented 11 months ago

Hey, so I know I'm responding to this like a year and half later, but what type of credentials are you referring to? Are we talking about EAP creds captured with the --creds flag or are we referring to something like domain / web login creds captured in captive portal mode? The answer depends on which we're talking about.

gusgorman402 commented 11 months ago

If I captured creds with the --creds flags, I don't know what wifi network (ESSID) they are associated with. Your program only outputs the creds but doesn't output which ESSID (beacon) these creds are associted with. Is there a way to output the ESSID the creds are associated with? Currently I have to run a second wifi chip/sniffer that logs to pcap. If i capture creds I have to search the second pcap to locate what wifi network these creds are from