Evil Twin attack is the kind of wireless attack that aims to make a replica of existing legitimate networks in order to lure people into it. The real play is about being able to control the victims traffic, sniff, or even perform Phishing by rerouting or for legitimate Wifi network password.
This guide isn't to assist you in intruding into unauthorized WLAN networks, it's be used appropriately, for education purposes.
This tutorial was done on Kali Linux with Realtek USB WiFi Adapter with the open-source RTL8188FU driver, thanks to @kelbek333 and contributors on GitHub. However the tools used in this guide has excellent record of working on various WiFi adapters like TP-Link, Atheros, etc.
⚠️ Disclaimer: This content is for educational and defensive purposes only. The goal is to raise awareness, not to promote illegal activities.
1. Prerequisites
Make sure you have these installed in your Kali Linux:
- Hostapd
- DNSMasq
- Creativity
- Python3
Also download the following Linux headers into your 'Downloads' since they have been remove from almost all internet resources. Use the link below to download
2. Install the Legacy Linux Headers
We do this step because the Realtek rtl8188fu driver hasn't been maintained for newer Linux Kernels. Newer Kernels comes with pre-installed rtl8188 driver but it isn't stable, often fails to perform AP setups. In order for it to work fine, we need to install custom compatible Kernels.
i.) Extract the content of the ZIP into a folder with the command below:
- unzip ~/Downloads/linux-headers-6.0.0.zip -d ./lin-head
ii.) Install them recursively with DPKG
- sudo apt install ./lin-head/*.deb
iii.) Reboot your Kali
- sudo reboot
3. Install RTL8188FU driver with DKMS. Run the commands one by one
- sudo apt-get install build-essential git dkms
- git clone https://github.com/kelebek333/rtl8188fu
- sudo modprobe -r rtl8188fu
- cd rtl8188fu
- sudo dkms add .sudo dkms build rtl8188fu/1.0
- sudo dkms install rtl8188fu/1.0
- sudo dkms install rtl8188fu/1.0
- sudo cp ./rtl8188fu/firmware/rtl8188fufw.bin /lib/firmware/rtlwifi/
4. Load the RTL8188FU driver now
- sudo modprobe rtl8188fu
5. You can now clone the tool for this job
- cd Sneak-Into-Wifi/hostapt+dnsmasq/ && sudo bash start_captive.sh
- cd Sneak-Into-Wifi/captive_portal && sudo python server.py
