c41n - an automated Rogue Access Point setup tool.


c41n provides automated setup of several types of Rogue Access Points, and Evil Twin attacks. c41n sets up an access point with user-defined characteristics (interface, name, and channel for the access point), sets up a DHCP server for the access point, and provides the user with abilities of HTTP traffic sniffing, or Captive Portal setup with credential sniffing. https://github.com/MS-WEB-BN/c41n Installation: The installation consists of cloning the repo, running a script that will install dependencies, or install them manually, and making c41n executable. Installation script works with apt and Pacman package managers (Debian and Arch only). # git clone https://github.com/MS-WEB-BN/c41n/ # cd c41n # sudo bash install.sh # sudo chmod +x c41n Dependencies can also be installed manually (without the script) with apt-get package manager (Debian and Debian based distributions): # sudo apt-get install net-tools hostapd dnsmasq tcpflow and pacman (Arch and Arch-based distributions): # sudo pacman -Sy net-tools hostapd dnsmasq....

October 15, 2020
Notify of
Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.
What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4


We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.