WireSpy allows users to quickly create honeypots to perform MITMA. The monitoring and recording function is implemented in order to "capture" the files from the data traffic of the victims' activities.
Also, many other tools can be used in conjunction with Wirespy to carry out more advanced attacks.
Two types of attacks are currently supported:
Evil twin: Force victims to automatically log in to the honeypot by forging a "trusted" hotspot (clone an existing access point and force users to log in easily and securely to the fake honeypot).
Honeypot: Set up a rogue hotspot and wait for customers to connect.
- Capture the victims' traffic.
- MAC address spoofing.
- Set up honeypot and evil twin attacks.
- Display the list of access points.
- Wireless adapter card dongle power boost.
Attacks: eviltwin > launch an evil twin attack honeypot > launch a rogue access point attack Commands: clear > clear the terminal help > list available commands quit|exit > exit the program apscan > show all wireless access points nearby leases > display DHCP leases powerup > power wireless interface up (may cause issues) start capture > start packet capture (tcpdump) stop capture > stop packet capture (tcpdump) status > show modules status
- Export the script:
$ chmod + x wirespy.sh
- Run the script as administrators:
$ sudo ./wirespy.sh
helpto display the available options.
You can download the program from here.