Skip to main content

WIFIPHISHER

Introduction

Wifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing. Using Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing targeted Wi-Fi association attacks. Wifiphisher can be further used to mount victim-customized web phishing attacks against the connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the victim stations with malwares.
This site aims to provide with resources regarding the tool usage and the ongoing research. The most important changes (features, bugfixes etc) in each Wifiphisher version are described on the Changelog. Using Wifiphisher is covered on the Documentation Guide.
You can also follow us on Twitter or like us on Facebook or star us on Github.
Happy phishing! :)

News

Wifiphisher v1.4 is out!

Date: 2018-01-12
It has been more than nine months since the Wifiphisher 1.3 release and I'm very pleased to announce a new release for you to enjoy! This is the biggest release that we had so far and it includes many improvements, performance enhancements and bug fixes.
The most important changes in Wifiphisher v1.4 are:
  • Known Beacons Attack. Wifiphisher already comes with different Wi-Fi automatic association attacks (including KARMA and Lure10). Known Beacons is our new technique that forces wireless clients to unknowingly connect to an attacker-controlled Access Point by broadcasting dozens of known beacon frames. Almost all modern network managers are affected. For more information on this attack go to the Researchpage and check the video of the 34C3 lightning talk.
  • Roguehostapd. We forked and patched hostapd for more sophisticated attacks. Roguehostapd has its own repo on Github and provides Python bindings for easy interaction with the Wifiphisher core.
  • Wifiphisher extensions. The modular design that we followed allows to developers to hack Wifiphisher by writing simple extensions in Python that interact with the tool's core. The extensions are executed in parallel with speed and efficiency. API documentation will be out shortly but for the impatient ones, you can have a look at our first five extensions under the "wifiphisher/extensions" directory.
You can check out all the changes on the Changelogpage or go straight to the Download page to try the new release.
This release wouldn't be possible without the amazing contributions of the Wifiphisher community. Thanks to everyone who helped and especially to Wifiphisher core developers Brian Smith and Anakin Tung.


For more info.visit their site
https://www.wifiphisher.org

Comments

  1. The casino is all about you - Dr. mcd
    This is the place to play all your favourite 문경 출장마사지 casino games, from roulette to 강릉 출장샵 blackjack, to 김포 출장안마 video poker and more! · 창원 출장샵 Visit The Casinos: 나주 출장안마 · Hotel: · Dining: · Entertainment:

    ReplyDelete

Post a Comment

Popular posts from this blog

How to Properly Hack PLDT Wifi: 100% Working in 2019

Pldt Wifi are easy to hack if you know how to properly used the tools available, these tools and apps are need to be download on your smartphones or tablets. PLDT wifi hacker allows you to connect to a PLDT router if you know some tricks, dony worry, it is very simple and easy to follow. How to download this file  New Update for new PLDT WIFI Device: June 29, 2018 Note: 50% change to working on same new device just try if working Example #1  PLDTWIFI52374 x 3 nyo bali 52374 x 3 = 157122 New password is:  PLDTWIFI157122  Example #2  network name: PLDTHOMEDSL57341 57341*3=172023 add mo yun PLDTWIFI password: PLDTWIFI172023  Supported Devices: Note: It's not hacking but it will only view password that has not been change the default password Android Phone ( Exclude Galaxy Young ) NOTE : MANUAL HACKING  If the name of the wifi is PldtMyDSL_XXX or the name of the wifi was included costumer name you may p...

HACK WIFI USING DRAGONBLOOD

DRAGONBLOOD Analysing WPA3's Dragonfly Handshake By  Mathy Vanhoef  (NYUAD) and  Eyal Ronen  (Tel Aviv University & KU Leuven) Currently, all modern Wi-Fi networks use WPA2 to protect transmitted data. However, because WPA2 is more than 14 years old, the Wi-Fi Alliance  recently announced  the new and more secure WPA3 protocol. One of the main advantages of WPA3 is that, thanks to its underlying Dragonfly handshake, it's near impossible to  crack  the password of a network. Unfortunately, we found that even with WPA3, an attacker within range of a victim  can still recover the password of the Wi-Fi network . Concretely, attackers can then read information that WPA3 was assumed to safely encrypt. This can be abused to steal sensitive transmitted information such as credit card numbers, passwords, chat messages, emails, and so on. The Dragonfly handshake, which forms the core of WPA3, is also used on certain Wi-Fi n...

WIBR+ WIFI HACK ANDROID

DOWNLOAD THE APP HERE WIBR+ is an advanced application for testing of security of the WPA/WPA2 PSK WiFi networks. This application is NOT FAKE, it really works and it will discover weak password. WIBR+ supports queueing, custom dictionaries, bruteforce generator and advanced monitoring! WIBR+ supports two types of attack Dictionary attack – WIBR+ tries passwords from predefined list one by one. Please don’t be disappointed if the password will not be found, it simply means that it was not in the dictionary. However, if the key is set to “12345678” or “password” it will be detected. WIBR+ supports importing of your own password lists, so you are not limited by pre-installed dictionaries! You can download dictionaries here . Bruteforce attack – you can select alphabet, length of password and the app will try all combinations of characters in the alphabet. Of course this is complete madness because the number of combinations is growing exponentially with password...