Pentest Tools

Published on September 7th, 2015 📆 | 2325 Views ⚑

0

infernal-twin — Automated Evil Twin Attack


https://www.ispeech.org

Automated Evil Twin Attack: infernal-twin

Evil twin is a term for a rogue Wi-Fi access point that appears to be a legitimate one offered on the premises, but actually has been set up to eavesdrop on wireless communications. An evil twin is the wireless version of the phishing scam. An attacker fools wireless users into connecting a laptop or mobile phone to a tainted hotspot by posing as a legitimate provider.

[adsense size='1']

This type of evil twin attack may be used to steal the passwords of unsuspecting users by either snooping the communication link or by phishing, which involves setting up a fraudulent web site and luring people there

 



 

 

infernal-twin 

What this tool will do ?

  1. Set up monitoring interface
  2. Set up DB
  3. Scan wireless network in the range
  4. Connect to the network selected SSID
  5. Obtain login page of authentication
  6. Modify the login page with attacker controlled php script to obtain the credentials
  7. Set up Apache Server and serve fake login page
  8. Give a victim an IP
  9. Set up NAT table
  10. Dump the traffic

 





Start Your Own Automated Evil Twin Attack:

git clone https://github.com/entropy1337/infernal-twin.git

[adsense size='1']

 

NEW FEATURES:

  • GUI Wireless security assessment SUIT
  • Impelemented
  • WPA2 hacking
  • WEP Hacking
  • WPA2 Enterprise hacking
  • Wireless Social Engineering
  • SSL Strip
  • Report generation
  • PDF Report
  • HTML Report
  • Note taking function
  • Data is saved into Database
  • Network mapping
  • MiTM
  • Probe Request

 

CHANGES:

  • Improved compatibility
  • Report improvement
  • Better NAT Rules

[adsense size='1']

BUG FIXES:

  • Wireless Evil Access Point traffic redirect
  • Fixed WPA2 Cracking
  • Fixed Infernal Wireless
  • Fixed Free AP
  • Check for requirements
  • DB implementation via config file
  • Improved Catch and error
  • Check for requirements

 

Coming Soon:

  • Parsing t-shark log files for gathering creds and more
  • More attacks.

 

Source && Download



Comments are closed.