Linset is a formidable tool that can be used by hackers to steal WPA and WPA2 Wi-Fi passwords from networks in range.
Linset Is a Necessity to the Hacker Arsenals
Linset was created as an educational tool for computer users to learn more about networking and programming. However, the program is quite capable if being used in malicious ways by criminals. And even though the developer of Linset has states that “It is prohibited under any circumstances the use this tool in foreign Wireless Networks!” all criminals are probably going to ignore the message.
The application uses the following mechanism of action.
- Linset scans the available networks and provides a list of them to the user
- The user selects the target network
- A handshake communication is captured
- A web interface is chosen
- A FakeAP imitation is launched against the network
- A DHCP server is created that is bound to the FakeAP
- Linset creates a DNS server that redirects all requests to the host computer
- The web server with the selected interface is launched
- A mechanism checks the validity of the entered passwords
- All users on the networks are deauthnenticated. As such the developers hope that they are going to connect to the FakeAP network and enter their Wi-Fi SSID password
- The attack stops after the correct password to the target network is captured
Linset is easy to use and requires a few dependencies on most popular Gnu/Linux distributions. The attack is only supported on Wi-Fi cards that support packet injection. To function properly the app depends on popular network software such as Airmon-ng, Macchanger, and lighthttpd.
And while the program is dated (it was updated two years ago) it can still be used as a powerful weapon against Wi-Fi Networks. You can download the tool and learn more on its page on GitHub.