Auto_EAP.py is a script designed to perform automated brute-force authentication attacks against various types of EAP networks. These types of wireless networks provide an interface to facilitate password guessing of domain credentials as radius servers check authentication against Active Directory.
Using the python library wpaspy, created by Jouni Malinen to interact with the wpa_supplicant daemon, automated authentication attacks can be preformed with the intent of not causing account lock-outs.
Run ‘RunMeFirst.py’ within the root directory of Auto_EAP. This will compile the wpaspy library as well as setup a stand alone wpa_supplicant.conf file that Auto_EAP.py will use for testing, leaving the system’s wpa_supplicant config file untouched.
./Auto_EAP.py -s HoneyPot -K WPA-EAP -E PEAP -U test.txt -p Summer2016 -i wlan0 Initialized... Trying Username Alice with Password test: SUCCESS Trying Username Bob with Password test: FAILED Trying Username Charles with Password test: FAILED Trying Username David with Password test: SUCCESS Completed
./Auto_EAP.py -h usage: Auto_EAP.py [-h] -i Interface -s SSID -U Usernamefile -p Password -K Key_mgmt -E Eap_type optional arguments: -h, --help show this help message and exit -i Interface, --interface Interface The Interface to use -s SSID, --ssid SSID The SSID to attack -U Usernamefile, --User Usernamefile Path to username file -p Password, --password Password Password to use -K Key_mgmt, --key_mgmt Key_mgmt Key_Management type to use -E Eap_type, --eap_type Eap_type Eap type to use
Latest posts by Unallocated Author (see all)
- The Digital Revolution: Ways to Drive Business Growth in the Private Education Sector - March 9, 2020
- Top Cybersecurity Trends In 2020 - February 20, 2020
- Microsoft Rolled Out Huge Patch Tuesday February With 99 Bug Fixes - February 14, 2020