List of 802.11 Modules¶
wifi_info¶
Presentation¶
wifi_info gets informations on a given WiFi interface. It can also show the different capabilities of the interface (SHOW_CAPABILITIES parameter).
Compatible devices¶
Input parameters¶
Name |
Default value |
Possible values |
Description |
---|---|---|---|
INTERFACE |
wlan0 |
wlanX |
Interface to analyse |
SHOW_CAPABILITIES |
yes |
yes|no |
Indicates if the capabilities of the interface should be displayed |
Output parameters¶
Name |
Possible values |
Description |
---|---|---|
INTERFACE |
wlanX |
Analysed interface |
ADDRESS |
<MAC address> |
MAC address of the interface |
MODE |
<WiFi interface mode> |
Current mode of the interface |
CHANNEL |
<integer> |
Current channel of the interface |
Usage¶
To get complete information about an interface, use the following command:
$ mirage wifi_info INTERFACE=wlp2s0
[INFO] Module wifi_info loaded !
┌───────────┬───────────────────┬─────────┬─────────┐
│ Interface │ MAC Address │ Mode │ Channel │
├───────────┼───────────────────┼─────────┼─────────┤
│ wlp2s0 │ F8:28:19:9A:30:39 │ Monitor │ 1 │
└───────────┴───────────────────┴─────────┴─────────┘
[INFO] Mirage process terminated !
wifi_scan¶
Presentation¶
wifi_scan scans for WiFi access points and stations. It allows to configure the execution time (TIME parameter), along with the fact to scan either stations, access points or both (STATIONS and ACCESS_POINTS parameters).
Compatible devices¶
Input parameters¶
Name |
Default value |
Possible values |
Description |
---|---|---|---|
INTERFACE |
wlan0 |
wlanX |
Interface to use |
TIME |
14 |
<integer> |
Execution time |
STATIONS |
yes |
<boolean> |
Scan for stations |
ACCESS_POINTS |
yes |
<boolean> |
Scan for access points |
Output parameters¶
If no devices are found, no output parameters are generated.
If only one device is found, the following output parameters are generated:
if the device is an Access Point:
Name
Possible values
Description
AP_ADDRESS
<MAC address>
MAC address of the access point
AP_SSID
<SSID>
SSID of the access point
AP_CHANNELS
<integer list>
Channels of the access point
if the device is a Station:
Name
Possible values
Description
TARGET
<MAC address>
MAC address of the station
CHANNELS
<integer list>
Channels of the station
If multiple devices have been identified, the same output parameters are generated, but are suffixed by the number of the device :
Name |
Possible values |
Description |
---|---|---|
AP_ADDRESS1 |
<MAC address> |
MAC address of the 1st access point |
AP_SSID1 |
<SSID> |
SSID of the 1st access point |
AP_CHANNELS1 |
<integer list> |
Channels of the 1st access point |
STATION_ADDRESS1 |
<MAC address> |
MAC address of the 1st station |
STATION_CHANNELS1 |
<integer list> |
Channels of the 1st station |
AP_ADDRESS2 |
<MAC address> |
MAC address of the 2nd access point |
AP_SSID2 |
<SSID> |
SSID of the 2nd access point |
AP_CHANNELS2 |
<integer list> |
Channels of the 2nd access point |
STATION_ADDRESS2 |
<MAC address> |
MAC address of the 2nd station |
STATION_CHANNELS2 |
<integer list> |
Channels of the 2nd station |
... |
... |
... |
Usage¶
To scan for both stations and access points, you can use the following command:
$ mirage wifi_scan
[INFO] Module wifi_scan loaded !
[INFO] New channel : 1
┌Access Point Found─┬──────────────────────────────────┬─────────┐
│ MAC Address │ SSID │ Channel │
├───────────────────┼──────────────────────────────────┼─────────┤
│ DC:9F:DB:F3:EF:9A │ LAN1 │ 1 │
│ DE:9F:DB:F7:B6:0A │ │ 1 │
│ 06:53:7C:94:87:47 │ Vodafone Homespot │ 1 │
│ 04:53:7C:94:87:46 │ Vodafone Hotspot │ 1 │
└───────────────────┴──────────────────────────────────┴─────────┘
[INFO] New channel : 2
┌Access Point Found─┬──────────────────────────────────┬─────────┐
│ MAC Address │ SSID │ Channel │
├───────────────────┼──────────────────────────────────┼─────────┤
│ DC:9F:DB:F3:EF:9A │ LAN1 │ 1 │
│ DE:9F:DB:F7:B6:0A │ │ 1 │
│ 06:53:7C:94:87:47 │ Vodafone Homespot │ 1 │
│ 04:53:7C:94:87:46 │ Vodafone Hotspot │ 1 │
│ E4:3E:D7:3B:AF:CD │ DonCorleone │ 2 │
└───────────────────┴──────────────────────────────────┴─────────┘
[INFO] New channel : 3
[INFO] New channel : 4
[INFO] New channel : 5
[INFO] New channel : 6
┌Access Point Found─┬──────────────────────────────────┬─────────┐
│ MAC Address │ SSID │ Channel │
├───────────────────┼──────────────────────────────────┼─────────┤
│ DC:9F:DB:F3:EF:9A │ LAN1 │ 1 │
│ DE:9F:DB:F7:B6:0A │ │ 1 │
│ 06:53:7C:94:87:47 │ Vodafone Homespot │ 1 │
│ 04:53:7C:94:87:46 │ Vodafone Hotspot │ 1 │
│ E4:3E:D7:3B:AF:CD │ DonCorleone │ 2 │
│ DC:9F:DB:F3:EE:C3 │ LAN1 │ 6 │
│ 06:18:D6:01:95:78 │ │ 6 │
└───────────────────┴──────────────────────────────────┴─────────┘
┌Stations Found─────┬─────────┐
│ MAC Address │ Channel │
├───────────────────┼─────────┤
│ 5E:F8:E1:A5:4F:2B │ 5,6 │
└───────────────────┴─────────┘
┌Stations Found─────┬─────────┐
│ MAC Address │ Channel │
├───────────────────┼─────────┤
│ 5E:F8:E1:A5:4F:2B │ 5,6 │
│ B4:74:43:6E:58:C3 │ 6 │
└───────────────────┴─────────┘
[INFO] New channel : 7
[INFO] New channel : 8
┌Stations Found─────┬─────────┐
│ MAC Address │ Channel │
├───────────────────┼─────────┤
│ 5E:F8:E1:A5:4F:2B │ 5,6 │
│ B4:74:43:6E:58:C3 │ 6 │
│ 1A:B1:37:5C:A7:7D │ 7 │
└───────────────────┴─────────┘
[INFO] New channel : 9
^C[INFO] Disabling monitor mode ...
[INFO] Mirage process terminated !
wifi_rogueap¶
Presentation¶
wifi_rogueap creates a fake WiFi access point (not connectible). You can choose the SSID of this fake AP using the SSID parameter, and you can also provide the channel and cryptographic suite to use (CHANNEL and CYPHER parameters).
Compatible devices¶
Input parameters¶
Name |
Default value |
Possible values |
Description |
---|---|---|---|
INTERFACE |
wlan0 |
wlanX |
Interface to use |
SSID |
mirage_fakeap |
<string> |
ESSID of the fake access point |
CHANNEL |
8 |
<integer> |
Channel of the fake access point |
CYPHER |
OPN |
OPN|WPA|WPA2|WEP |
Type of the fake network |
Output parameters¶
This module doesn’t provide any output parameters.
Usage¶
To create an open Fake Access Point named “MirageFakeAP” on the channel 13, use the following command:
$ mirage wifi_rogueap INTERFACE=wlp2s0 SSID=MirageFakeAP CYPHER=OPN CHANNEL=13
[INFO] Module wifi_rogueap loaded !
[INFO] New channel : 1
[INFO] New channel : 13
[INFO] Incoming Probe Request from : B4:74:43:6E:58:C3
[INFO] Answering...
[INFO] Incoming Probe Request from : B4:74:43:6E:58:C3
[INFO] Answering...
[INFO] Incoming Probe Request from : B4:74:43:6E:58:C3
[INFO] Answering...
[INFO] Incoming Probe Request from : B4:74:43:6E:58:C3
[INFO] Answering...
[INFO] Incoming Probe Request from : B4:74:43:6E:58:C3
[INFO] Answering...
[INFO] Incoming Probe Request from : B4:74:43:6E:58:C3
[INFO] Answering...
[INFO] Incoming Probe Request from : B4:74:43:6E:58:C3
[INFO] Answering...
^C[INFO] Mirage process terminated !
If you want to use another cypher method, you can change the CYPHER parameter:
$ mirage wifi_rogueap INTERFACE=wlp2s0 SSID=MirageFakeAP CYPHER=WPA2 CHANNEL=13
[INFO] Module wifi_rogueap loaded !
[INFO] New channel : 1
[INFO] New channel : 13
[INFO] Incoming Probe Request from : B4:74:43:6E:58:C3
[INFO] Answering...
[INFO] Incoming Probe Request from : B4:74:43:6E:58:C3
[INFO] Answering...
[INFO] Incoming Probe Request from : B4:74:43:6E:58:C3
[INFO] Answering...
[INFO] Incoming Probe Request from : B4:74:43:6E:58:C3
[INFO] Answering...
[INFO] Incoming Probe Request from : B4:74:43:6E:58:C3
[INFO] Answering...
[INFO] Incoming Probe Request from : B4:74:43:6E:58:C3
[INFO] Answering...
[INFO] Incoming Probe Request from : B4:74:43:6E:58:C3
[INFO] Answering...
^C[INFO] Mirage process terminated !
wifi_deauth¶
Presentation¶
wifi_deauth performs a Deauthentication attack on a WiFi station. It allows to configure the source of the spoofed packets (SOURCE parameter), the target (TARGET parameter), along with fine configuration for the attack, and the number of times to send the packets (COUNT parameter, 0 means send continuously).
Compatible devices¶
Input parameters¶
Name |
Default value |
Possible values |
Description |
---|---|---|---|
INTERFACE |
wlan0 |
wlanX |
Interface to use |
SOURCE |
00:11:22:33:44:55 |
<MAC address> |
AP’s MAC address |
TARGET |
FF:FF:FF:FF:FF:FF |
<MAC address> |
Target’s MAC address |
COUNT |
0 |
<integer> |
Number of packets to send |
MODE |
both |
disassociation|deauthentication|both |
Types of packet to send during the attack |
VERBOSE |
yes |
<boolean> |
Verbose mode |
REASON |
7 |
<integer> |
Disassociation reason ID |
CHANNEL |
1 |
<integer> |
WiFi channel |
Output parameters¶
This module doesn’t provide any output parameters.
Usage¶
The following command performs a deauthentication and disassociation attack by transmitting 10 frames to FF:EE:DD:CC:BB:AA on the channel 11:
$ sudo mirage wifi_deauth SOURCE=AA:BB:CC:DD:EE:FF TARGET=FF:EE:DD:CC:BB:AA COUNT=10 VERBOSE=yes CHANNEL=11 INTERFACE=wlp2s0
[INFO] Module wifi_deauth loaded !
[INFO] New channel : 1
[INFO] Target provided: FF:EE:DD:CC:BB:AA
[INFO] New channel : 11
[INFO] Sent 0 deauthentication packets via wlp2s0
[INFO] Sent 10 deauthentication packets via wlp2s0
[INFO] Mirage process terminated !
If you want to transmit only deauthentication frame, set the MODE parameter to “deauthentication”:
$ sudo mirage wifi_deauth SOURCE=AA:BB:CC:DD:EE:FF TARGET=FF:EE:DD:CC:BB:AA COUNT=10 MODE=deauthentication VERBOSE=yes CHANNEL=11 INTERFACE=wlp2s0
[INFO] Module wifi_deauth loaded !
[INFO] New channel : 1
[INFO] Target provided: FF:EE:DD:CC:BB:AA
[INFO] New channel : 11
[INFO] Sent 0 deauthentication packets via wlp2s0
[INFO] Sent 10 deauthentication packets via wlp2s0
[INFO] Mirage process terminated !
Similarly, if you want to transmit only disassociation frames, set the MODE parameter to “disassociation”:
$ sudo mirage wifi_deauth SOURCE=AA:BB:CC:DD:EE:FF TARGET=FF:EE:DD:CC:BB:AA COUNT=10 MODE=disassociation VERBOSE=yes CHANNEL=11 INTERFACE=wlp2s0
[INFO] Module wifi_deauth loaded !
[INFO] New channel : 1
[INFO] Target provided: FF:EE:DD:CC:BB:AA
[INFO] New channel : 11
[INFO] Sent 0 deauthentication packets via wlp2s0
[INFO] Sent 10 deauthentication packets via wlp2s0
[INFO] Mirage process terminated !