Skip to content

flankerhqd/wifimonster

Repository files navigation

wifimonster

Wifi sniffing and hijacking tool

Currently the tool is able to

  • sniff cookie and form passwords from open wifi in monitor mode
  • one-click to launch a browser with sniffed cookie

This tool does not require ARP attack, just silent sniffing, thus invisible to victim. Besides, the sniffing does not require one to associate AP, making it even more diffcult to detect.

#Requirements:

  • PyQT >=4
  • Scapy >=2.0

Tested on Backtrack5 and Mountain Lion

#Usage:

e.g: python cookiemonster.py -i en0 [-c 1]

File / Interface
    -i --interface <interface>    Choose specified interface
    -f --file <filename>         Choose specified filename
    -c --channel <channel>      Choose specified channel (For Mac OS X only)

On poping cookie window, right click on useragent items and select "launch attack" to open a browser using sniffed cookie. Sniffed passwords are stored in monsterCookie.log

#Demo Screenshots:

The following cookies and screenshots were captured in Wooyun Summit 2014 by sniffing hotel open wifi.

Cookies Attack launched

About

Wifi sniffing and hijacking tool

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages