Skip to content

Karma Spear

7h30th3r0n3 edited this page Jan 2, 2025 · 4 revisions
  • Extends the Karma Attack to include only Open SSIDs captured during wardriving sessions.
  • Allows adding custom SSIDs to the KarmaList.txt for targeted attacks.
  • Automatically tries Karma Attacks on open networks detected during wardriving:
    • Open SSIDs captured during wardriving are sorted and stored in KarmaList.txt (optional).
    • This works even without GPS coordinates if enabled by the user.

Workflow

During Wardriving Session:

  1. Open SSID Capture

    • The tool scans for open networks (unencrypted SSIDs).
  2. Optional Logging

    • The user can choose to save the detected open SSIDs to a file (KarmaList.txt) at the end of the session.
  3. Custom SSIDs

    • The user can manually add custom SSIDs to KarmaList.txt to target specific networks.

Karma Spear Attack:

  1. Use KarmaList.txt

    • The tool reads the KarmaList.txt file, which contains:
      • Open SSIDs captured during the wardriving session.
      • Manually added custom SSIDs.
  2. Karma Attack Attempt

    • For each SSID in KarmaList.txt:
      • A spoofed Access Point is created with the given SSID.
      • The tool tries to attract vulnerable devices to connect automatically.
  3. Connection Handling

    • If a client connects:
      • The spoofed network remains active.
    • If no client connects:
      • The tool proceeds to the next SSID in KarmaList.txt.
  4. End of Attack

    • The process continues until all SSIDs in KarmaList.txt are attempted or the user manually stops the attack.

Optional Features

  • No GPS Mode:
    • If GPS is unavailable, SSIDs can still be logged and used for attacks.
  • Custom SSID Input:
    • Users can manually add specific SSIDs to KarmaList.txt before or after a wardriving session.

Example Use Case

  1. Perform a wardriving session to scan for open networks near the targeted environnement.
  2. Save the detected open SSIDs to KarmaList.txt.
  3. Add any custom SSIDs to the file as needed.
  4. Launch the Karma Auto Attack using KarmaList.txt.
  5. Wait for devices to connect to the spoofed networks, or move to the next SSID automatically.

Configuration

  • File: KarmaList.txt
    • Format: One SSID per line.
    • Automatically updated after each wardriving session (if enabled).
    • Supports manual additions for custom SSIDs.

More informations about karma attack and probes here :
https://7h30th3r0n3.fr/does-your-machine-have-a-good-or-bad-karma/

Clone this wiki locally