Ghost Phisher stands out as a specialized tool within Kali Linux, designed for crafting and executing simulated Wi-Fi attacks. Aimed at security professionals and ethical hackers, Ghost Phisher offers features tailored for social engineering and penetration testing scenarios:
- Ghost Phisher excels in creating deceptive Evil Twin access points, luring unsuspecting devices to connect to a rogue Wi-Fi network. This technique enhances the tool's effectiveness in capturing sensitive information.
- The tool includes modules for capturing login credentials, leveraging phishing pages and other social engineering tactics. Ghost Phisher facilitates the extraction of usernames and passwords from connected devices.
- Ghost Phisher incorporates DNS spoofing capabilities, allowing the manipulation of DNS responses. This feature enhances the tool's effectiveness in redirecting traffic to malicious sites for further exploitation.
- Ghost Phisher simplifies the process of launching attacks against WPA/WPA2-protected networks. It includes functionalities for capturing handshakes and conducting offline password cracking attempts.
- With a graphical user interface (GUI), Ghost Phisher provides an accessible platform for users to configure and launch attacks. The intuitive interface streamlines the setup process for both beginners and experienced users.
Installation
Clone the Ghost Phisher repository from GitHub using the command:
Navigate to the Ghost Phisher directory:
Run the setup script with elevated privileges:
Running
Launch Ghost Phisher by typing the following command in the terminal: