-
Notifications
You must be signed in to change notification settings - Fork 55
Karma Attack
7h30th3r0n3 edited this page Jan 2, 2025
·
4 revisions
- Sniff probe requests from nearby devices.
- Provide a menu to select a unique SSID once the scan is stopped.
- Deploy a captive portal with the selected SSID:
- If the original Access Point (AP) is an open network and the target device is vulnerable, it will automatically connect to the spoofed network.
- The captive portal can be configured with or without a password.
- Automatically display the portal:
- A pop-up may appear depending on the target device's configuration.
- Alternatively, a notification might prompt interaction with the portal.
- Portal management:
- If a client connects before the timer ends or the scan is stopped, the portal remains active.
- If no client is present, the portal shuts down automatically.
- Launch the tool to sniff probe requests.
- Select an SSID from the detected probes after stopping the scan.
- It deploy the portal with the chosen SSID for 60 seconds.
- Wait for clients to connect automatically or interact with the portal.
- The karma attack stop if client is detected.
More informations about karma attack and probes here :
https://7h30th3r0n3.fr/does-your-machine-have-a-good-or-bad-karma/
- Scan WiFi
- Select WiFi
- Clone & Details
- Captive Portal Management
- Check Credential
- Probes Attack
- Sniffing Probes
- Karma Attack
- Automated Karma Attack
- Karma Spear
- Bluetooth Serial Control
- Wardriving
- Wardriving Master
- Beacon Spam
- Deauther
- Handshake Master
- WiFi Raw Sniffing
- Sniff Raw Client
- WiFi Channel Visualizer
- Client Sniff And Deauth
- EAPOL/Deauth Detection
- Wall Of Flipper
- Send Tesla Code with RFunit
- SSH Shell
- Scan Network and Port
- Full Network Scan
- Web Crawler
- PwnGridSpam
- Skimmer Detector
- BadUSB
- Bluetooth Keyboard
- Reverse TCP Tunnel
- DHCP Starvation Attack
- Rogue DHCP Server
- Switch DNS
- Network Hijacking
- Printer Attack
- Custom Theming