LogoHackDB
icon of hostapd-wpe

hostapd-wpe

Modified hostapd to facilitate AP impersonation attacks, obtaining client credentials and enabling further attacks.

Introduction

hostapd-wpe (Wireless Pwnage Edition)

hostapd-wpe is a modified version of hostapd designed to facilitate AP impersonation attacks. It's a replacement for FreeRADIUS-WPE, implementing IEEE 802.1x Authenticator and Authentication Server impersonation attacks to obtain client credentials and establish connectivity.

Key Features:

  • EAP Impersonation: Supports various EAP types for impersonation, including EAP-FAST/MSCHAPv2, PEAP/MSCHAPv2, EAP-TTLS/MSCHAPv2, EAP-TTLS/MSCHAP, EAP-TTLS/CHAP, and EAP-TTLS/PAP.
  • Credential Harvesting: Returns an EAP-Success message to the client after credentials are harvested, making the client believe they are connected to a legitimate authenticator.
  • Karma-Style Probes: Implements gratuitous probe responses for 802.11 clients, inspired by JoMo-Kun's patch.
  • Heartbleed Attack: Implements CVE-2014-0160 (Heartbleed) attacks against vulnerable clients, inspired by the Cupid PoC.
  • Logging: Logs all data to stdout and hostapd-wpe.log.

Use Cases:

  • Penetration testing of wireless networks.
  • Auditing the security of EAP-based authentication.
  • Demonstrating the risks of AP impersonation attacks.
  • Testing client-side vulnerability to Heartbleed.

Target Users:

  • Security researchers
  • Penetration testers
  • Network administrators
  • Ethical hackers

Information

Newsletter

Join the Community

Subscribe to our newsletter for the latest news and updates