OpenWIPS-ng2

OpenWIPS-ng

OpenWIPS-ng is not a turnkey commercial solution. There’s no wizard, no click-to-deploy, no GUI polish. It expects Wi-Fi knowledge and some Python chops.

OS: Windows, Linux
Size: 10 MB
Version: 0.1 beta 1
🡣: 2078

OpenWIPS-ng: Wireless Intrusion Detection That Speaks 802.11

A modular framework for monitoring, detecting, and reacting to Wi-Fi threats — the open way

What is OpenWIPS-ng?
It’s an open-source Wireless Intrusion Prevention System, developed by the Aircrack-ng team. It passively sniffs 802.11 traffic, detects anomalies like rogue APs, spoofed frames, or deauth floods, and can react — automatically — by jamming or alerting.

No license keys. No cloud dashboards. Just a set of daemons working together to watch over your airspace.

Let’s say someone sets up a rogue access point with your SSID.
Users start connecting. Credentials get harvested. Traffic gets sniffed.
With OpenWIPS-ng in place, that rogue signal is picked up, classified, and — depending on rules — jammed automatically.
No human intervention required.

Where It’s Being Used

– Security monitoring in air-gapped or sensitive wireless environments.
– Detection of rogue APs, evil twin attacks, and unauthorized associations.
– Academic or research labs analyzing wireless behavior over time.
– Small or budget-limited orgs that need visibility into 802.11 threats.
– Supplement to enterprise NAC or IDS setups — as the wireless layer.

Key Characteristics

Feature What That Means in Practice
3-Part Architecture Sensor (sniffing), Server (detection engine), Interface (web console)
Modular Rules Engine Write detection and response logic in Python
Rogue Device Detection Flags APs and clients not whitelisted or behaving oddly
Active Response Can send deauth frames to block or disrupt attackers
Full Packet Logging Captures all 802.11 frames — searchable and storable
Flexible Deployment Works on standard Linux with compatible Wi-Fi cards
Open Format Storage Events saved as JSON — easy to analyze or export
Web Dashboard (optional) Monitor alerts and device list in real-time
Built by Aircrack-ng Team Integrates well with classic Wi-Fi testing tools
Truly Open Source No vendor lock-in, no phone-home, no proprietary formats

What You Actually Need

– Linux system (Debian/Ubuntu preferred)
– At least one USB Wi-Fi adapter in monitor mode (Atheros, Ralink recommended)
– Python 3.6+
– aircrack-ng tools pre-installed

To install:

git clone https://github.com/aircrack-ng/OpenWIPS-ng.git
cd OpenWIPS-ng
pip install -r requirements.txt

Start the server:

python server/server.py

Start the sensor:

python sensor/sensor.py -i wlan1mon

Launch the interface (optional):

python interface/interface.py

What Users Say in Practice

“It flagged a rogue AP using our SSID — right outside the office. We wouldn’t have noticed otherwise.”

“We set up a passive monitor near the server room. It’s already blocked two spoof attempts.”

“Not a plug-and-play tool. But if you know what you’re doing — it gives you full control.”

One Thing to Keep in Mind

OpenWIPS-ng is not a turnkey commercial solution. There’s no wizard, no click-to-deploy, no GUI polish. It expects Wi-Fi knowledge and some Python chops.

But for environments where wireless security matters — and where full-stack commercial WIPS is out of reach or overkill — OpenWIPS-ng delivers deep, transparent control over the RF space.

Other articles

Submit your application