The idea here is to create an evil twin AP, then de-authenticate or DoS the user from their real AP. When they re-authenticate to your fake AP with the same SSID, they will see a legitimate-looking webpage that requests their password because of a “firmware upgrade.” When they provide their password, you capture it and then allow them to use the evil twin as their AP, so they don’t suspect a thing. Brilliant!
To sum up, Wifiphisher takes the following steps:
De-authenticate the user from their legitimate AP.
Offer a webpage to the user on a proxy that notifies them that a “firmware upgrade” has taken place, and that they need to authenticate again.
The Wi-Fi password is passed to the hacker and the user continues to the web oblivious to what just happened.
Similar scripts have been around for awhile, such as Airsnarf, but this new Wifiphisher script is more sophisticated. In addition, you could always do this all manually, but now we have a script that automates the entire process.
To do this hack, you will need Kali Linux and two wireless adapters, one of which must be capable of packet injection. Here, I used the tried and true, Alfa AWUS036H. You may use others, but before you do, make certain that it is compatible with Aircrack-ng (packet injection capable). Please do NOT post questions on why it doesn’t work until you check if your wireless adapter can do packet injection. Most cannot.