Pentest Tools

Published on May 12th, 2016 📆 | 8620 Views ⚑

0

WiFi-Pumpkin — Rogue WiFi Access Point Attack


Powered by iSpeech

Framework for Rogue WiFi Access Point Attack


WiFi-Pumpkin is security tool that provide the Rogue access point to Man-In-The-Middle and network attacks. purporting to provide wireless Internet services, but snooping on the traffic. can be used to capture of credentials of unsuspecting users by either snooping the communication by phishing.

 

Features

  • Rouge WiFi Access Point
  • Deauth Clients AP
  • Probe Request Monitor
  • DHCP Starvation Attack
  • Crendentials Monitor
  • Windows Update Attack
  • Templates phishing
  • Partial bypass HSTS
  • Dump credentials phishing
  • Support airodump scan
  • Support mkd3 deauth
  • beef hook support
  • Report Logs html
  • Mac Changer
  • ARP Posion
  • DNS Spoof

 

WiFi-Pumpkin v0.7.5 Released !

[adsense size='1']

WiFi-Pumpkin installation


Dependencies:
  • hostapd
  • isc-dhcp-server
  • php5-cli
  • Linux require soft:
    • rfkill , iptables , nmcli

To Install Pyqt4

Install the dependencies:





pip install -r requirements.txt
Install
 git clone https://github.com/P0cL4bs/WiFi-Pumpkin.git
 cd WiFi-Pumpkin
 chmod +x installer.sh
 ./installer.sh --install

Plugins

 

Transparent Proxy

You can use transparent proxies to intercept and manipulate HTTP/HTTPS traffic by modifying requests and responses and inject javascripts into pages that targets visit. You can easily implement a module to inject data into pages by creating a python file in “Proxy”directory  which will automatically be listed on PumpProxy tab.


Rogue WiFi Access Point Attack: WiFi-Pumpkin Wiki

Rogue WiFi Access Point Attack: WiFi-Pumpkin

 

Source && Download

https://github.com/P0cL4bs/WiFi-Pumpkin



Comments are closed.