Published on May 12th, 2016 📆 | 8620 Views ⚑
0WiFi-Pumpkin — Rogue WiFi Access Point Attack
Framework for Rogue WiFi Access Point Attack
WiFi-Pumpkin is security tool that provide the Rogue access point to Man-In-The-Middle and network attacks. purporting to provide wireless Internet services, but snooping on the traffic. can be used to capture of credentials of unsuspecting users by either snooping the communication by phishing.
Features
- Rouge WiFi Access Point
- Deauth Clients AP
- Probe Request Monitor
- DHCP Starvation Attack
- Crendentials Monitor
- Windows Update Attack
- Templates phishing
- Partial bypass HSTS
- Dump credentials phishing
- Support airodump scan
- Support mkd3 deauth
- beef hook support
- Report Logs html
- Mac Changer
- ARP Posion
- DNS Spoof
WiFi-Pumpkin v0.7.5 Released !
[adsense size='1']
WiFi-Pumpkin installation
Dependencies:
- hostapd
- isc-dhcp-server
- php5-cli
- Linux require soft:
- rfkill , iptables , nmcli
To Install Pyqt4
Install the dependencies:
pip install -r requirements.txt
Install
git clone https://github.com/P0cL4bs/WiFi-Pumpkin.git
cd WiFi-Pumpkin
chmod +x installer.sh
./installer.sh --install
Plugins
Transparent Proxy
You can use transparent proxies to intercept and manipulate HTTP/HTTPS traffic by modifying requests and responses and inject javascripts into pages that targets visit. You can easily implement a module to inject data into pages by creating a python file in “Proxy”directory which will automatically be listed on PumpProxy tab.
Source && Download
https://github.com/P0cL4bs/WiFi-Pumpkin
Gloss