WPA-MGT
WPA-Enterpise rogue AP attack
Setup
sudo airmon-ng check kill
sudo airmon-ng start wlan0sudo airodump-ng wlan0monCapture + output as recon-01.pcap
# -c channel -w output filename = recon-0#
sudo airodump-ng -c # --essid AP_NAME --bssid XX:XX:XX:XX:XX:XX -w recon --output-format pcap wlan0monMay deauth a client once to get reconnection for cert info
#-a AP -c Client
sudo aireplay-ng -0 1 -a XX:XX:XX:XX:XX:XX -c YY:YY:YY:YY:YY:YY wlan0monReview the traffic / recon-01.pcap to get cert info
#wireshark filter
tls.handshake.type == 11,3
# or
tls.handshake.certificate
Review cert info
Preparation
Edit freeradius cert config (as root user)
Create fake cert (as root user)
Setup rogue AP with hostapd-mana
Create mana.conf and mana.eap_user to /etc/hostapd-mana/ (as root)
mana.conf and mana.eap_user to /etc/hostapd-mana/ (as root)Launch rogue AP
Retrieve credentials with asleap command provided by mana

Connect to the network with retrieved credentials
Create wpa_supplicant.conf
wpa_supplicant.conf Connect to network
Get proof
Last updated