WATT contains the specialised scripts and configurations required to generate realistic, controlled wireless attack scenarios. It serves as the "Attacker" environment in the research lab setup.
- Rigor & Reliability: Tested against 8 distinct threat classes (passive, active, stateful, and high-volume) with a 100% detection success rate in the associated analysis engine.
- Independent Operation: Operates as a standalone environment to maintain laboratory integrity during monitor-mode capture sessions.
- Dynamic Networking: Utilises automated IP forwarding and NAT rules to simulate internet-connected rogue APs.
- Attack Library: Per-threat folders containing specific launch and teardown scripts (e.g., Evil Twin, Deauth Flood).
- Service Orchestration: Integrated control of
hostapd,dnsmasq,mdk4, andbettercap. - Lab Hardware: Specifically tuned for Ubuntu 22.04 LTS and Alfa monitor-mode adapters.
Click to view original Technical Specifications & Usage
This repository contains configuration files, scripts, and tooling for the Wireless Attack Testing Toolkit (WATT) environment. It supports the Wireless Security Testing Toolkit (WSTT) project by generating realistic, controlled wireless attack scenarios.
- attacks/ – Per-threat scenario folders for each implemented attack
- scripts/ – Core AP launch, teardown, and service control scripts
- hostapd.conf – Default open or WPA2 rogue AP configuration
- dnsmasq.conf – DHCP configuration for IP and DNS assignment
attacks/
T004_evil_twin/
T005_open_rogue_ap/
T007_deauth_flood/
scripts/
start-ap.sh
stop-ap.sh
hostapd.conf
dnsmasq.conf
- Ubuntu 22.04 LTS (or compatible)
- Alfa AWUS036ACM wireless adapter (AP mode capable)
- Tools:
hostapd,dnsmasq,iptables,mdk4,aircrack-ng,bettercap,tcpdump,macchanger
Use the provided scripts to start and stop rogue APs in either NAT (internet passthrough) or isolated mode:
- Start open rogue AP with internet passthrough:
sudo ./start-ap.sh nat - Start AP with no internet access:
sudo ./start-ap.sh - Stop all services and restore system state:
sudo ./stop-ap.sh
- Config files
- Attack launch scripts (attack.sh)
- Teardown scripts (stop.sh)
- Optional logs and documentation
- This attacker environment operates independently from WSTT
- WSTT captures traffic in monitor mode for offline analysis
- No real-time coordination or defence interaction required
- systemd-resolved is disabled when running AP mode to avoid DNS conflicts
- NetworkManager is stopped to prevent interface conflicts
- IP forwarding and NAT rules are dynamically applied
- Client devices must manually connect to AP during test scenarios
This project is licenced under the MIT Licence.
- Paul Smurthwaite
- 15 May 2025
- TM470-25B
See the Core Toolkit (WSTT) for the main analysis engine.