Ghost Phisher Wireless Attack Tool
Ghost Phisher Wireless Attack Tool
Ghost Phisher is a powerful tool available in Kali Linux for conducting phishing attacks, fake access point creation, and other network attacks. It provides an easy-to-use graphical interface for exploiting wireless and Ethernet networks.
Install Ghost Phisher
Ghost Phisher may not come pre-installed in Kali Linux, but you can install it using the following command:
$ sudo apt update && sudo apt install ghost-phisher
Launch Ghost Phisher
Once installed, launch Ghost Phisher with the following command:
$ sudo ghost-phisher
This will open the graphical user interface (GUI) of the tool.
Creating a Fake Access Point
Follow these steps to create a fake Wi-Fi access point:
- Open Ghost Phisher.
- Go to the Access Point Settings section.
- Enter the SSID (Wi-Fi name) of your choice.
- Select the network interface (e.g., wlan0).
- Click on Start Access Point.
Set Up a Phishing Page
To capture credentials, you can set up a phishing page:
- Enable HTTP Server in the Ghost Phisher interface.
- Specify the Phishing Page directory.
- Start the HTTP server and let victims connect.
Capturing Credentials
When victims enter their credentials on the fake page, Ghost Phisher logs them. You can view them in the tool’s log window or in a specified directory.
Stop the Attack
To stop the attack, simply click on Stop Access Point and Stop HTTP Server. You can also kill the process using:
$ sudo pkill ghost-phisher
Ghost Phisher is a useful tool for penetration testing but should only be used ethically and legally. Always test within authorized environments to avoid legal consequences.