Skip to main content

This package enable to use the computer as a Rogue AP in a MitM Channel-Based attack

Project description


This is a Python Package to help you to create a MitM (Man-in-the-Middle) channel-based attack in a 802.11 network.

Configure Interfaces and Create Sockets

The package needs two wireless cards to work. It configures the 2 interfaces on them and more 2 virtual interfaces (the interfaces names may vary according to the system):

  • nic_real_mon (wlan1) - monitor interface that listen packets on the real channel
  • nic_real_clientack (wlan1sta1) - managed interface to ACK frames sent by the real AP
  • nic_rogue_ap (wlan0) - managed interface on which the Rogue AP works (hostapd_rogue)
  • nic_rogue_mon (wlan0mon) - monitor interface that listen packet on the rogue channel

Then, it is created sockets on monitor interfaces.

Copy the Real AP configuration, initiate hostapd_rogue.conf and send CSA beacons

  • The package tries to capture one beacon sent by the Real AP, then copies it's network configuration to create a hostapd_rogue.conf file.

  • From that, a Rogue AP is created on a different (rogue) channel.

  • After this, the Rogue AP starts to send CSA (Channel Switch Announcement) beacons frames with the new channel on it, to try the clients to connect to the rogue channel.

Project details

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

mitm_channel_based-0.0.5.tar.gz (11.7 kB view hashes)

Uploaded Source

Built Distribution

mitm_channel_based-0.0.5-py2-none-any.whl (13.8 kB view hashes)

Uploaded Python 2

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page