Skip to content

rsenet/MACSpoofingDetector

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

About MACSpoofingDetector

MACSpoofingDetector was written in order to quickly allow any system administrator to identify a Rogue Access Point based on Sequence Number usurpation.

Usage

Print the help to get all necessary information

└─# python3 spoofMacBySNDetector.py --help
usage: spoofMacBySNDetector.py [-h] [--bssid BSSID] [--int INT]

Access Point MAC Spoofing Detector

options:
  -h, --help     show this help message and exit
  --bssid BSSID  Specify targeted Access Point MAC Address (BSSID)
  --int INT      Specify Monitor Interface

You just have to specify the interface (with Mode Monitor enabled) and the targeted BSSID:

└─# python3 spoofMacBySNDetector.py --int wlan0 --bssid 48:2f:6b:XX:XX:XX
Access Point MAC: 48:2f:6b:XX:XX:XX with SSID b'Rsenet-guest'
52992
53328
53424
53472
53520
53712

To be continued ...

Setting the interface to monitor mode:

└─# airmon-ng start wlan0


PHY Interface Driver    Chipset

phy4  wlan0   88XXau    Realtek Semiconductor Corp. RTL8812AU 802.11a/b/g/n/ac 2T2R DB WLAN Adapter
    (monitor mode enabled)

Author

Régis SENET (rsenet)

Contributing

Bug reports and pull requests are welcome on GitHub.

License

The project is available as open source under the terms of the GPLv3

About

Access Point MAC Spoofing Detector

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages