Wifiphiser v1.3 – Fast automated phishing attack against WPA networks.


Wifiphisher is a security tool that mounts fast automated phishing attacks against WPA networks in order to obtain the secret passphrase. It is a social engineering attack that unlike other methods it does not include any brute forcing. It is an easy way for obtaining WPA credentials.

Changelog wifipihser v1.3 15/4/2017:

o Introduced –quitonsuccess (-qS) option. [@javaes]
o Introduced Travis CI. [@d33tah]
o Install pylint in Travis. [@blackHatMonkey]
o Web server migration to Tornado. Fixes various bugs and increases performance. [@sophron]
o Remove DNS leases after the script restarts. [@laozi999]
o Introduced –internetinterface (-iI) option to provide Internet connectivity to victims. [@sophron]
o Added support for iOS and Android to our network manager imitation template. [@alexsalvetti]
o Introduced a new deauthentication module. [@blackHatMonkey]
o Introduced a new recon module, including new features in target AP selection phase. [@blackHatMonkey]
o Code refactoring including a more modular design. [@sophron]
o Introduced accesspoint module serving as a hostapd wrapper. [@sophron]
o Introducing Lure10, an attack for automatic association against Windows devices. [@sophron]

Requirements :
– Kali Linux.
– Two network interfaces, one wireless.
– A wireless card capable of injection.

git clone https://github.com/sophron/wifiphisher
cd wifiphisher
python wifiphisher.py -h (for helper)
 
update:
cd wifiphisher
git pull


No comments

Note: Only a member of this blog may post a comment.

Powered by Blogger.