Skip to main content

This package enable to use the computer as a Rogue AP in a MitM Channel-Based attack

Project description

mitm-channel-based-package

This is a Python Package to help you to create a MitM (Man-in-the-Middle) channel-based attack in a 802.11 network.

Configure Interfaces and Create Sockets


The package needs two wireless cards to work. It configures the 2 interfaces on them and more 2 virtual interfaces (the interfaces names may vary according to the system):

  • nic_real_mon (wlan1) - monitor interface that listen packets on the real channel
  • nic_real_clientack (wlan1sta1) - managed interface to ACK frames sent by the real AP
  • nic_rogue_ap (wlan0) - managed interface on which the Rogue AP works (hostapd_rogue)
  • nic_rogue_mon (wlan0mon) - monitor interface that listen packet on the rogue channel

Then, it is created sockets on monitor interfaces.

Copy the Real AP configuration, initiate hostapd_rogue.conf and send CSA beacons


  • The package tries to capture one beacon sent by the Real AP, then copies it's network configuration to create a hostapd_rogue.conf file.

  • From that, a Rogue AP is created on a different (rogue) channel.

  • After this, the Rogue AP starts to send CSA (Channel Switch Announcement) beacons frames with the new channel on it, to try the clients to connect to the rogue channel.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Filename, size & hash SHA256 hash help File type Python version Upload date
mitm_channel_based-0.0.5-py2-none-any.whl (13.8 kB) Copy SHA256 hash SHA256 Wheel py2
mitm_channel_based-0.0.5.tar.gz (11.7 kB) Copy SHA256 hash SHA256 Source None

Supported by

Elastic Elastic Search Pingdom Pingdom Monitoring Google Google BigQuery Sentry Sentry Error logging AWS AWS Cloud computing DataDog DataDog Monitoring Fastly Fastly CDN SignalFx SignalFx Supporter DigiCert DigiCert EV certificate StatusPage StatusPage Status page