Skip to content

πŸ‘¨β€πŸ’»πŸ•΅πŸ»πŸ‘©β€πŸ’» Analyze user behavior against fake access pointsπŸ“‘

License

Notifications You must be signed in to change notification settings

WiPi-Hunter/PiUser

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

20 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

             β–„β–„β–„β–„β–„β–„β–„β–„β–„β–„β–„  β–„β–„β–„β–„β–„β–„β–„β–„β–„β–„β–„  β–„         β–„  β–„β–„β–„β–„β–„β–„β–„β–„β–„β–„β–„  β–„β–„β–„β–„β–„β–„β–„β–„β–„β–„β–„  β–„β–„β–„β–„β–„β–„β–„β–„β–„β–„β–„ 
            β–β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–Œβ–β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–Œβ–β–‘β–Œ       β–β–‘β–Œβ–β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–Œβ–β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–Œβ–β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–Œ
            β–β–‘β–ˆβ–€β–€β–€β–€β–€β–€β–€β–ˆβ–‘β–Œ β–€β–€β–€β–€β–ˆβ–‘β–ˆβ–€β–€β–€β–€ β–β–‘β–Œ       β–β–‘β–Œβ–β–‘β–ˆβ–€β–€β–€β–€β–€β–€β–€β–€β–€ β–β–‘β–ˆβ–€β–€β–€β–€β–€β–€β–€β–€β–€ β–β–‘β–ˆβ–€β–€β–€β–€β–€β–€β–€β–ˆβ–‘β–Œ
            β–β–‘β–Œ       β–β–‘β–Œ             β–β–‘β–Œ       β–β–‘β–Œβ–β–‘β–Œ          β–β–‘β–Œ          β–β–‘β–Œ       β–β–‘β–Œ
            β–β–‘β–ˆβ–„β–„β–„β–„β–„β–„β–„β–ˆβ–‘β–Œ     β–β–‘β–Œ     β–β–‘β–Œ       β–β–‘β–Œβ–β–‘β–ˆβ–„β–„β–„β–„β–„β–„β–„β–„β–„ β–β–‘β–ˆβ–„β–„β–„β–„β–„β–„β–„β–„β–„ β–β–‘β–ˆβ–„β–„β–„β–„β–„β–„β–„β–ˆβ–‘β–Œ
            β–β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–Œ     β–β–‘β–Œ     β–β–‘β–Œ       β–β–‘β–Œβ–β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–Œβ–β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–Œβ–β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–Œ
            β–β–‘β–ˆβ–€β–€β–€β–€β–€β–€β–€β–€β–€      β–β–‘β–Œ     β–β–‘β–Œ       β–β–‘β–Œ β–€β–€β–€β–€β–€β–€β–€β–€β–€β–ˆβ–‘β–Œβ–β–‘β–ˆβ–€β–€β–€β–€β–€β–€β–€β–€β–€ β–β–‘β–ˆβ–€β–€β–€β–€β–ˆβ–‘β–ˆβ–€β–€ 
            β–β–‘β–Œ               β–β–‘β–Œ     β–β–‘β–Œ       β–β–‘β–Œ          β–β–‘β–Œβ–β–‘β–Œ          β–β–‘β–Œ     β–β–‘β–Œ  
            β–β–‘β–Œ           β–„β–„β–„β–„β–ˆβ–‘β–ˆβ–„β–„β–„β–„ β–β–‘β–ˆβ–„β–„β–„β–„β–„β–„β–„β–ˆβ–‘β–Œ β–„β–„β–„β–„β–„β–„β–„β–„β–„β–ˆβ–‘β–Œβ–β–‘β–ˆβ–„β–„β–„β–„β–„β–„β–„β–„β–„ β–β–‘β–Œ      β–β–‘β–Œ 
            β–β–‘β–Œ          β–β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–Œβ–β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–Œβ–β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–Œβ–β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–‘β–Œβ–β–‘β–Œ       β–β–‘β–Œ
             β–€            β–€β–€β–€β–€β–€β–€β–€β–€β–€β–€β–€  β–€β–€β–€β–€β–€β–€β–€β–€β–€β–€β–€  β–€β–€β–€β–€β–€β–€β–€β–€β–€β–€β–€  β–€β–€β–€β–€β–€β–€β–€β–€β–€β–€β–€  β–€         β–€ 


                        Analyze user behavior against fake access points               

Purpose

πŸ“‘ Examine probe requests in the environment to determine if they have previously connected to the malicious network πŸ“‘ Thus, the number of people who are likely to fall into the potentially fake access point in the environment is determined

For corporation environment

  • Monitors company name in probe requests
  • Monitors blacklist ssids in probe requests

For clients

  • Analyzes behavior the clients of the corporation with probe requests

Screenshots:

DEMO


Usage (for Linux)

Requirements

  • Modules: time, termcolor, commands, interfaces, os
  • OS: Kali, Ubuntu
  • Python Version: 2.x

Download PiUser:

git clone https://github.com/WiPi-Hunter/PiUser.git

Install Python librarie(s):

pip install -r requirements.txt

It's done!

Run the program with following command:

Run:

cd PiUser
python piuser.py

About

πŸ‘¨β€πŸ’»πŸ•΅πŸ»πŸ‘©β€πŸ’» Analyze user behavior against fake access pointsπŸ“‘

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages