Skip to content

Karma Attack

7h30th3r0n3 edited this page Jan 2, 2025 · 4 revisions
  • Sniff probe requests from nearby devices.
  • Provide a menu to select a unique SSID once the scan is stopped.
  • Deploy a captive portal with the selected SSID:
    • If the original Access Point (AP) is an open network and the target device is vulnerable, it will automatically connect to the spoofed network.
    • The captive portal can be configured with or without a password.
  • Automatically display the portal:
    • A pop-up may appear depending on the target device's configuration.
    • Alternatively, a notification might prompt interaction with the portal.
  • Portal management:
    • If a client connects before the timer ends or the scan is stopped, the portal remains active.
    • If no client is present, the portal shuts down automatically.

Example Use Case

  1. Launch the tool to sniff probe requests.
  2. Select an SSID from the detected probes after stopping the scan.
  3. It deploy the portal with the chosen SSID for 60 seconds.
  4. Wait for clients to connect automatically or interact with the portal.
  5. The karma attack stop if client is detected.

More informations about karma attack and probes here :
https://7h30th3r0n3.fr/does-your-machine-have-a-good-or-bad-karma/

Clone this wiki locally