The MANA Attack: A Rogue Wi-Fi Adventure
Introduction
In the realm of Wi-Fi security, two intriguing attacks stand out: the MANA attack and the KARMA attack. Let’s delve into their mechanics and explore how the hostapd-mana tool enables these exploits.
KARMA Attack
The KARMA attack exploits a behavior exhibited by some Wi-Fi devices, coupled with the absence of access point authentication in various Wi-Fi protocols. It’s essentially a variant of the evil twin attack. Here’s how it works:
Preferred Network List (PNL): Vulnerable client devices broadcast a PNL containing the SSIDs of access points they’ve previously connected to. These SSIDs are ones the client is willing to automatically reconnect to without user intervention.
Exploiting the PNL: The KARMA attack involves an access point receiving this PNL and masquerading as an evil twin of a trusted access point. If the malicious access point’s signal is stronger than that of the genuine access point, and the client doesn’t attempt to authenticate, the attack succeeds.
Man-in-the-Middle (MITM): Once successful, the malicious access point becomes a man-in-the-middle, positioning it to launch further attacks against the victim device¹.
MANA Attack
Now, let’s meet the MANA attack. Unlike KARMA, MANA doesn’t target access point credentials directly. Instead, it operates more like a MITM attack. Here’s what makes it fascinating:
Rogue Access Points: MANA creates rogue access points that trick users into connecting. These rogue APs can intercept various EAP (Extensible Authentication Protocol) credentials.
Hostapd-mana: The tool of choice for MANA attacks is hostapd-mana. It’s an enhanced version of the original hostapd. While both can host fake APs, hostapd-mana offers additional features, including dumping passwords obtained from handshakes.
EAP MANA Configuration:
# Basic MANA ATTACK config interface=wlan0 ssid=hostapd-mana wifi channel=6 hw_mode=g enable_mana=1 mana_loud=1
This configuration sets up a MANA-enabled access point with EAP interception capabilities⁷.
# Common EAP MANA ATTACK configuration interface=wlan1 ssid=netname channel=6 hw_mode=g # WPA configuration wpa=2 wpa_key_mgmt=WPA-EAP wpa_pairwise=TKIP CCMP # EAP server configuration ieee8021x=1 eapol_key_index_workaround=0 eap_server=1 eap_user_file=netname.eap_user # Certificate configuration for EAP-TLS/PEAP/TTLS ca_cert=/root/certs/ca.pem server_cert=/root/certs/server.pem private_key=/root/certs/server.key private_key_passwd= dh_file=/root/certs/dhparam.pem # MANA-specific configuration mana_wpe=1 mana_eapsuccess=1
- Orchestrating MANA Attacks: To orchestrate MANA attacks, we use berate_ap. Here are some commands:
- To trick users into connecting to your access point (default MANA behavior):
berate_ap --eap --mana wlan0 eth0 MyAccessPoint
- To enable MANA WPE attacks separately:
berate_ap --eap --mana-wpe wlan0 eth0 MyAccessPoint
- Other options include
--mana-eapsuccess
and--mana-eaptls
. The default location for the credential output file is/tmp/hostapd.credout
⁶.
- To trick users into connecting to your access point (default MANA behavior):
Why I Adore MANA
MANA isn’t just about Wi-Fi hacking; it’s an artful dance of deception. While it has limitations (like antenna requirements and dealing with multiple access points), its MITM wireless concept transcends mere Wi-Fi hacking. MANA is my favorite attack by far, and its versatility never ceases to amaze me.
So, next time you’re exploring Wi-Fi security, consider stepping into the world of MANA. It’s a journey worth taking!
Remember, MANA isn’t just about Wi-Fi hacking; it’s an artful dance of deception. While it has limitations (like antenna requirements and dealing with multiple access points), its MITM wireless concept transcends mere Wi-Fi hacking. MANA is my favorite attack by far, and its versatility never ceases to amaze me. ⁸⁹
Feel free to explore the hostapd-mana GitHub repository and start your own rogue AP adventures! 🌐🔍
- (1) KARMA attack - Wikipedia. https://en.wikipedia.org/wiki/KARMA_attack.
- (2) GitHub - sensepost/hostapd-mana: SensePost’s modified hostapd for wifi …. https://github.com/sensepost/hostapd-mana.
- (3) GitHub - SecureCloud-biz/berate_ap: Script for orchestrating mana rogue …. https://github.com/SecureCloud-biz/berate_ap.
- (4) Rogue Access Points | Shuciran Pentesting Notes. https://shuciran.github.io/posts/Rogue-Access-Points/.
- (5) hostapd-mana | Kali Linux Tools. https://www.kali.org/tools/hostapd-mana/.
- (6) DARMA: Defeating and Reconnaissance Manna-karma Attacks in 802. … - WARSE. https://www.warse.org/IJATCSE/static/pdf/file/ijatcse13913sl2020.pdf.
- (7) How Does a KARMA Attack Work? - Packetlabs. https://www.packetlabs.net/posts/karma-attack/.
- (8) berate-ap | Kali Linux Tools. https://www.kali.org/tools/berate-ap/.
- (9) GitHub - sensepost/berate_ap: Script for orchestrating mana rogue WiFi …. https://github.com/sensepost/berate_ap.
- (10) undefined. http://sensepost.com/contact.