infernal-twin
Release 3
Improved and Compatibility on Kali Linux 2018
Added Visual Representation of Wireless Scan
Added Visual Representation of Probe Requests and Map per SSID requested by Devices
Updated MAC address mapping
Added MAC address mappting on probe request devices
Evil Twin Attack on WPA2 PSK (with provided credentials)
Development Testing of Automated Wireless Scan Wizard
MiTM improvement and integration with Metasploit
Improved Social Engineering Aspects over Wireless Network
Added Beacon signal on wireless scan results
Organized File Structure and Layout of the tool
Created dedicated Folder for Logs and management
Release 2.6.11
Menu to retrieve logs are added
Release 2.6.10
Added BeeF XSS framework Integration
Added HTTP Traffic View within tool
Improved Infenral Wireless Attack
Visual View of some of the panel improved
Improved Basic Authentication during Social engineering assessment over wireless network
Infernal-Wireless v2.6
This tool is created to aid the penetration testers in assessing wireless security. Author is not responsible for misuse. Please read instructions thoroughly.
Usage: python InfernalWireless.py
(from the same folder where your code exists)
For any comments and suggestions please email on 1337[@]gmail[dot]com
Non ASCII SSID Name used to crash the software. It is fixed now
Warnings on the background is supressed
New Experimental Section is added but under development
Better User Interface
More Network device controls
Better SSL Strip Control
User / Access Point Deauthentication with auto channel detection of AP
Extra Wireless Scanner to detect Probe Requests, wireless Network scan and connections to AP detection
airgraph-ng suite is better implemented
WPA2 Hacking UI is changed for better control over the attack
WPA2 Enterprise Hacking UI is changed for better control over the attack
Custome Fake Access Point is implemented. Freenet AP is deleted now.
Check for software updates
Wiki page with video links to attacks tutorials
Folder are more structured
Check for prerequesites automatically
Solution:
(Thanks to @lightos
for this fix)
There seem to be few issues with Database connectivity. The solution is to create a new user on the database and use that user for launching the tool. Follow the following steps.
Delete dbconnect.conf file from the Infernalwireless folder
Run the following command from your mysql console.
mysql>use mysql;
mysql>CREATE USER 'root2'@'localhost' IDENTIFIED BY 'enter the new password here';
mysql>GRANT ALL PRIVILEGES ON *.* TO 'root2'@'localhost' WITH GRANT OPTION;
Try to run the tool again.
GUI Wireless security assessment SUIT
Impelemented
WPA2 hacking
WEP Hacking
WPA2 Enterprise hacking
Wireless Social Engineering
SSL Strip
Report generation
PDF Report
HTML Report
Note taking function
Data is saved into Database
Network mapping
MiTM
Probe Request
Improved compatibility
Report improvement
Better NAT Rules
Wireless Evil Access Point traffic redirect
Fixed WPA2 Cracking
Fixed Infernal Wireless
Fixed Free AP
Check for requirements
DB implementation via config file
Improved Catch and error
Check for requirements
Works with Kali 2
Parsing t-shark log files for gathering creds and more
More attacks.
Wireless card might not be supported
Might crash on Windows
Freeze
A lot of work to be done, but this tool is still being developed.
Special thanks to all my friends for comments and feedbacks.
Thank you zstyblik a lot for your patches, suggestions and improvements on the tool.
Creators:
Aircrack
SSL Strip
Online Community
Others whom I forgot to mention.
还没有评论,说两句吧!
热门资源
seetafaceJNI
项目介绍 基于中科院seetaface2进行封装的JAVA...
spark-corenlp
This package wraps Stanford CoreNLP annotators ...
Keras-ResNeXt
Keras ResNeXt Implementation of ResNeXt models...
capsnet-with-caps...
CapsNet with capsule-wise convolution Project ...
inferno-boilerplate
This is a very basic boilerplate example for pe...
智能在线
400-630-6780
聆听.建议反馈
E-mail: support@tusaishared.com