Karma exploits the way devices automatically search for saved WiFi networks. When a phone or laptop has WiFi on but isn't connected, it broadcasts probe requests — announcing the names of networks it has connected to before. Karma listens for these probes, then creates a fake open AP with that exact name. The device thinks it found its known network and auto-connects, landing on a captive portal.
Setup
- Go to WiFi > Karma Attack
- Save WiFi List — Toggle on/off; when enabled, all discovered SSIDs are saved to
/unigeek/wifi/karma/list.txt - Captive Portal — Select a portal template from
/unigeek/wifi/portals/; download sample portals via WiFi > Network > Download > Firmware Sample Files if none exist - Waiting Time — How long (in seconds) to keep each fake AP active waiting for a device to connect (default: 15s)
- Waiting Input — How long (in seconds) to wait for the connected user to submit credentials on the portal (default: 120s); resets on each form submission
- Start — Launches the attack
During Attack
The attack runs in an automated cycle:
- Sniff — Promiscuous mode captures probe request frames from nearby devices
- Deploy — For each new SSID discovered, a fake open AP is created with a captive portal
- Wait for connect — If no device connects within the waiting time, the SSID is blacklisted and the next one is tried
- Wait for input — If a device connects but submits nothing within the input timeout, the SSID is blacklisted and the cycle continues
- Capture — When the victim submits the portal form, credentials are saved and a notification sounds
The status bar shows real-time stats:
- AP — Total probe SSIDs captured
- V — Portal page visits
- P — Form submissions (POSTs)
- Right side shows the current SSID being attacked, or "Sniffing..." when listening
Press BACK or Press to stop the attack.
Files
| Path | Description |
|---|---|
/unigeek/wifi/captives/karma_ssid.txt |
Saved probe SSIDs, format: {epoch}:{ssid} per line |
/unigeek/wifi/captives/karma_<SSID>.txt |
Captured credentials per SSID |
/unigeek/wifi/portals/<name>/ |
Portal templates (shared with Evil Twin) |
Notes
- Karma works best against older devices, IoT gadgets, and laptops. Modern iOS/Android versions use randomized or hidden probes, reducing effectiveness.
- The blacklist is session-only — SSIDs that timed out won't be retried during the current attack, but are cleared when you stop and restart.
- Karma creates open APs (no password), so there is no WPA handshake — this is purely a captive portal phishing attack.
- Cannot run simultaneously with other WiFi features (EAPOL capture, BLE, etc.) since they share the radio.
