FuzzAP – A python script for obfuscating wireless networks.
The main differences between these implementations is hardware requirements and how the fake access point is generated.
* FakeAP generates fake access points by creating an access point using iw and ifconfig with a PRISM-based wireless card. The problem is PRISM drivers are mostly deprecated in most modern distros. Even with a working driver and a PRISM card, I was unable to get FakeAP to work out of the box.
* AirRaid is almost identical to how FakeAP works. However, it is tailored towards Atheros- based cards and utilizes the madwifi drivers and utilities to create fake access points. The Madwifi projects seems to be mostly dying down in favor of ath5/9k drivers. Out-of-the-box, AirRaid no longer worked with my atheros card.
Another problem with these implementations, was speed. As each fake access point was created, the wireless deviced had to be up-downed and reconfigured.
This implementation differs in a number of ways. It is not totally hardware specific like FakeAP or AirRaid. Instead of creating a fake access point by changing the settings for the wireless adapter and having to reset and reconfigure the device, it takes advantage of wireless cards that support packet-injection.
* python 2.7.X
* Scapy 2.2.0
* wireless card with drivers that support packet injection
* Fixed shell designation
Usage and download from source:
git clone https://github.com/lostincynicism/FuzzAP && cd FuzzAP
airmon-ng start <interface>
sudo python fuzzap.py <interface> <number of APs> common.txt ssid.txt