How I made a fake access point to harvest login credentials? by Aditya Anand


This article is kind of a continuation to the last one I wrote.

How I hacked into my neighbour’s WiFi and harvested login credentials?

It’s better if you go through it, but still let me explain it to you in short. I hacked into a wifi network by cracking the password using dictionary attack and then monitored the traffic. The only problem with this attack is it’s not guaranteed to work all the time, as the dictionary attack won’t work. One of the readers raised this question.

One of the comments 

That got me thinking that what could be other possible scenarios where I can get people’s traffic, without having to rely on luck, like them using easy passwords or a WEP connection etc. That’s when it struck me what if I create a fake access point and use that to harvest login credentials.

Let’s dig in!

The whole idea was to create a free wifi point, without any password. Grant access to anyone who gets connected to it. Now that it doesn’t ask for any password anyone whose wifi is turned on will automatically get connected to the fake wifi point and all the freebies will definitely be attracted to it.

So, the first thing I had to do was to create the fake access point. To carry that out I used the tool called as wifi-pumpkin. The best thing about this tool is that it lets you set up a fake access point with incredible simplicity. Once, you clone the tool from the Github repository into your Kali machine, just make sure you have installed hostapd as well in your Kali machine, as it requires that.

Home Tab 

The GUI version of WiFi-Pumpkin looks something like the picture in the side. You can easily set up the whole network features according to your needs.

Everything you need to setup the fake access point is available under the “Settings” tab.

Here you can configure the name of the wifi, provide it with a BSSID, which channel do you want it to work on, choose the network adapter and many more features. You can go ahead and also assign the IP range, the activities you want to monitor etc.

Settings Tab 

So after all the configuration is done you can go ahead and start the fake wifi. It is preferred to setup the fake wifi point with a common name, like “Free -Wifi” or “Jio-Net” or the name of a nearby shop or something like that. It helps to establish trust with the users, so that they will use your fake wifi point without any hesitance. Once you boot up your wifi point, the devices starts to get connected and all of them will be listed in the “Home” tab.

List of Devices 

You can view all the logs in the “Activity-Monitor” tab, it has all the logins the user made on any of the http websites, it has the logs of every website the user visited while he was connected to your fake access point.

Logs of websites & login credentials 

You can enhance the level of the hack by using different plugins present under the “Plugins” tab, it has many advanced tools one of them is key-logger. Under the “Images-Cap” you can view all the images that is being loaded on the website that the user is visiting.

This gives you complete access to all the details of the user who is utilising your WiFi point. You can’t perform a better attack than this on a network ( that’s my opinion ).


So, the most basic thing here is never ever use a free wifi point until and unless you have complete trust over it. Anyone on that network could be sniffing your traffic and you will never know, till it’s too late.

Whenever logging into banking websites or your social network accounts always make sure that you are using a trusted network or even better use your own data on your mobile phones. That will keep you secure to a huge extent and unwanted leak of your data won’t take place.

If you enjoyed it please do clap and happy hacking!

Twitter :

LinkedIn :

E-mail : [email protected]

Originally posted:

January 29, 2019


Hakin9 TEAM
Hakin9 is a monthly magazine dedicated to hacking and cybersecurity. In every edition, we try to focus on different approaches to show various techniques - defensive and offensive. This knowledge will help you understand how most popular attacks are performed and how to protect your data from them. Our tutorials, case studies and online courses will prepare you for the upcoming, potential threats in the cyber security world. We collaborate with many individuals and universities and public institutions, but also with companies such as Xento Systems, CATO Networks, EY, CIPHER Intelligence LAB, redBorder, TSG, and others.
Notify of

This site uses Akismet to reduce spam. Learn how your comment data is processed.

1 Comment
Oldest Most Voted
Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023