Skip to content
This repository was archived by the owner on Feb 4, 2026. It is now read-only.

paulsmurthwaite/watt

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

76 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Wireless Attack Testing Toolkit (WATT)

Overview

WATT contains the specialised scripts and configurations required to generate realistic, controlled wireless attack scenarios. It serves as the "Attacker" environment in the research lab setup.

Engineering Philosophy

  • Rigor & Reliability: Tested against 8 distinct threat classes (passive, active, stateful, and high-volume) with a 100% detection success rate in the associated analysis engine.
  • Independent Operation: Operates as a standalone environment to maintain laboratory integrity during monitor-mode capture sessions.
  • Dynamic Networking: Utilises automated IP forwarding and NAT rules to simulate internet-connected rogue APs.

Key Features

  • Attack Library: Per-threat folders containing specific launch and teardown scripts (e.g., Evil Twin, Deauth Flood).
  • Service Orchestration: Integrated control of hostapd, dnsmasq, mdk4, and bettercap.
  • Lab Hardware: Specifically tuned for Ubuntu 22.04 LTS and Alfa monitor-mode adapters.

Implementation Archive

Click to view original Technical Specifications & Usage

Wireless Attack Testing Toolkit (WATT)

This repository contains configuration files, scripts, and tooling for the Wireless Attack Testing Toolkit (WATT) environment. It supports the Wireless Security Testing Toolkit (WSTT) project by generating realistic, controlled wireless attack scenarios.

Repository Structure

  • attacks/ – Per-threat scenario folders for each implemented attack
  • scripts/ – Core AP launch, teardown, and service control scripts
  • hostapd.conf – Default open or WPA2 rogue AP configuration
  • dnsmasq.conf – DHCP configuration for IP and DNS assignment

Example:

attacks/
  T004_evil_twin/
  T005_open_rogue_ap/
  T007_deauth_flood/

scripts/
  start-ap.sh
  stop-ap.sh
  hostapd.conf
  dnsmasq.conf

Host System Requirements

  • Ubuntu 22.04 LTS (or compatible)
  • Alfa AWUS036ACM wireless adapter (AP mode capable)
  • Tools: hostapd, dnsmasq, iptables, mdk4, aircrack-ng, bettercap, tcpdump, macchanger

Scenario Execution

Use the provided scripts to start and stop rogue APs in either NAT (internet passthrough) or isolated mode:

  • Start open rogue AP with internet passthrough: sudo ./start-ap.sh nat
  • Start AP with no internet access: sudo ./start-ap.sh
  • Stop all services and restore system state: sudo ./stop-ap.sh

Each attack scenario in attacks/ contains:

  • Config files
  • Attack launch scripts (attack.sh)
  • Teardown scripts (stop.sh)
  • Optional logs and documentation

Integration with WSTT

  • This attacker environment operates independently from WSTT
  • WSTT captures traffic in monitor mode for offline analysis
  • No real-time coordination or defence interaction required

Notes

  • systemd-resolved is disabled when running AP mode to avoid DNS conflicts
  • NetworkManager is stopped to prevent interface conflicts
  • IP forwarding and NAT rules are dynamically applied
  • Client devices must manually connect to AP during test scenarios

License

This project is licenced under the MIT Licence.


Author

  • Paul Smurthwaite
  • 15 May 2025
  • TM470-25B

Project Ecosystem

See the Core Toolkit (WSTT) for the main analysis engine.

About

A specialised environment for generating controlled wireless attack scenarios. Supports automated rogue AP deployment and L2/L3 threat simulations for security research and training. Developed for a BSc (Hons) Cyber Security final year project.

Topics

Resources

License

Stars

Watchers

Forks

Contributors