C41N : An Automated Rogue Access Point Setup Tool

c41n is an automated Rogue Access Point setup tool. c41n provides automated setup of several types of Rogue Access Points, and Evil Twin attacks.

It sets up an access point with user defined characteristics (interface, name and channel for the access point), sets up DHCP server for the access point, and provides user with abilities of HTTP traffic sniffing, or Captive Portal setup with credential sniffing.

Installation

Installation consists of cloning the repo, running a script that will install dependencies , and making c41n executable. Script only works with apt package manager (Debian based distributions).

# git clone https://github.com/MS-WEB-BN/c41n/
# cd c41n
# sudo bash install.sh
# sudo chmod +x c41n

Dependencies can also be installed manually (without the script) with apt-get package manager (Debian based distributions):

# sudo apt-get install net-tools hostapd dnsmasq tcpflow

Usage

c41n can be run in interactive, and quick mode.

To run c41n in interactive mode:

# ./c41n

Quick mode:

Start Rogue AP:

# ./c41n <AP interface> <internet connection interface><AP name><AP channel>

Start Rogue AP + sniffing HTTP traffic:

# ./c41n sniff <AP interface><internet connection interface><AP name><AP channel>

Start Rogue AP + captive portal:

# ./c41n captive <ap interface><internet connection interface><AP name><AP channel><redirection parameter>

Redirection parameter can have the following values:

0: Redirects only predefined domains.
1: Redirects all traffic. domains_file: Redirects predefined domains + domains from specified file (separated by new line).

Examples:

[1] Start Rogue AP on wlan0 interface, route traffic from eth0 interface, AP name: ‘AP’, AP channel: ‘1’

# ./c41n wlan0 eth0 AP 1

[2] Start Rogue AP and sniff HTTP traffic on wlan0 interface, route traffic from wlan1 interface, AP name: ‘Access_Point’, AP channel: ‘6’

# ./c41n sniff wlan0 wlan1 Access_Point 6

[3] Start Rogue AP with captive portal on wlp6s0 interface, redirect default domains and domains from custom file (/home/name/Documents/domains.txt), route traffic from eth1 interface, AP name: ‘router’, AP channel: ‘9’

# ./c41n captive wlp6s0 eth1 router 9 /home/name/Documents/domains.txt

Disclaimer

Any actions and/or activities done by using h4rpy are solely your responsibility. The misuse of h4rpy can result in criminal charges brought against the persons in question. The author will not be held responsible in the event any criminal charges be brought against any individuals misusing h4rpy to break the law.

R K

Recent Posts

Playwright-MCP : A Powerful Tool For Browser Automation

Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…

3 weeks ago

JBDev : A Tool For Jailbreak And TrollStore Development

JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…

3 weeks ago

Kereva LLM Code Scanner : A Revolutionary Tool For Python Applications Using LLMs

The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…

3 weeks ago

Nuclei-Templates-Labs : A Hands-On Security Testing Playground

Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…

3 weeks ago

SSH-Stealer : The Stealthy Threat Of Advanced Credential Theft

SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…

3 weeks ago

ollvm-unflattener : A Tool For Reversing Control Flow Flattening In OLLVM

Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…

3 weeks ago