Page 14 of 20
From our second service, we need to connect to the ssid “open wifi”
Ahhhh, now that we have connected to the ssid and redirected to the login homepage we can see that
what shows wasn’t the generic one we had the last time but this shows a cloned Facebook login page
where a victim can put in his credentials and it would be taken.
From the below screenshot credentials has been taken and printed on the attacker’s screen
Page 15 of 20
Writing pulp for Wifipumkin
At times as hackers we would like to make things easier for us and faster one way, we could do this not
only with this tool but legitimate everything is to write a script that automates all the commands we would
like to input into the program. below we would use the command “nano” to create a file which we have
written the command we need to input into wifipumpkin. we need to also make sure that the extension
of the file is pulp because that is how wifipumpkin would be able to read the script
Now that we have created the pulp extension script we just need to call up wifipumpkin with the extension
of where the script is located
cat demo.pulp
wifipumpkin3 –pulp demo.pulp
Page 16 of 20
One-liner Attack
Just like we created a script to run our commands we can also do that by writing all the requests in one
line.
Here we another SSID as Nisha.
wifipumpkin3 --xpulp "set interface wlan0; set ssid nisha; set proxy noproxy; start"
Page 17 of 20
DNS Spoofing with wifipumpkin
Just as we can use the customized flask which is in the tool we could also use the Html document which
we have created and would like to use for the attack on a user. Bellow we would see that we are in the
“www” “HTML” directory here is where any HTML file which we need to use for a website is located, we
would create an HTML file which displays “welcome to the hacking article” below we would see the
walkthrough on how to do this.
cd /var/www/html
echo “Welcome to Hacking Articles” > index.html
service apache2 restart
ifconfig eth0
Page 18 of 20
Now that we have created the HTML file and know the Ip address for our ethernet cable lets go into
wifipumpkin and try to add this new HTML file to our command and see how we can spoof the DNS server
so that when we visit the site the DNS server will spoof it to the page which we want it to be
set interface wlan0
set ssid HA
set proxy noproxy
ignore pydns_server
show
use spoof.dns_spoof
set domains vulnweb.com
set redirectTo 192.168.1.2
start
Page 19 of 20
Now that the attack has started we can now connect to the ssid “HA” . and when the victim visits the
“vulweb.com” he would be redirected by the DNS server to the page which we created on our attacking
machine.
Page 20 of 20
Below shows the HTML file which we created and how the DNS server spoof the webpage “vulweb.com”
to the one we wanted.
*******************