Select “Evil Twin” from the menu. Allow up to 30 seconds to initialize the network.
A single attacker pane will appear in your terminal.
Note: The software and methods used to create these labs are strictly limited to Linux environments. This lab uses a simulated connection to provide the NetNTLM hashes. Nonetheless, the process shown here exactly mirrors a real application of Eaphammer.
Run the following command to start Eaphammer.
/Wifi-Forge/Framework/materials/eaphammer -e CORP_NET --creds --interface a-wlan0
Running this command will result in the following output. The hashes should appear as seen below after being captured from an authenticating host. Allow up to a minute for this to occur.
The following will appear when the connection occurs.
Hashes are saved to /Wifi-Forge/Framework/loot/ under the filename wpa_handshake_capture[date][random_string].
Use the main_menu
command to return to the main menu and onto the next lab.
NEXT LAB: Lab 07 - Capture Active Directory Credentials with Evil-Twin Attack