wireless hacking - This is evil twin attack automated
Clone or download
Pull request Compare This branch is 73 commits ahead, 2 commits behind entropy1337:master.
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Permalink
Failed to load latest commit information.
.idea
airgraph-ng
build
capture
graphviz
img
lib
man
support
wiki
.gitignore
.htaccess
InfernalWireless.py
LICENSE.txt
Makefile
MiTM_data.txt
MiTM_sniffer.py
README.md
access_to_db.py
connected_clients.txt
create_db_hotspot.py
create_my_db.py
db_connect_creds.py
db_setup.py
dbconnect.conf
dump-join
evil_twin.py
evil_twin_version3.py
evil_twin_version_finalv1.py
fakePagecreate.py
fetch_db.py
geany_run_script.sh
generate_pdf_file.py
getVictimIP.py
getVictimIP_bkp.py
get_client_list.py
get_iface.py
hostapd-evil.conf
hostapd-freenet.conf
hostapd-wpe.conf
index.php
infernal_class.py
infernal_wireless_gui.py
infernal_wireless_gui_project.py
input_file.txt
key_found.txt
keys.txt
login_test.py
mitm_sniffer_core.py
myNotes.txt
notepad.py
ntlm_hashes.py
output-01.kismet.netxml
project_form.py
project_view_panel.py
redirecthandle.py
release_note.txt
report_generator.py
result.txt
setup.py
splash_screen.py
sql_insert.py
textboxes.txt
thisanothergui.py
tips.txt
victim_ip_browser.py
view_projects.py
w-sniffer.py
wless_commands.py
wless_commands_wireless.py
wless_sniffer.py
wp2_crack.py
wpa-cracker-gui.py
wpa2_hack.py

README.md

This tool is created to aid the penetration testers in assessing wireless security. Author is not responsible for misuse. Please read instructions thoroughly.

Usage: python InfernalWireless.py (from the same folder where your code exists)

For any comments and suggestions please email on 3ntr0py1337@gmail.com

Note: Please make sure to run the 'configure under File menu to install required software'

Recent Bug Fixes:

  • Display Scanned network with BSSID and Channel

  • WPA2 hacking is now captured by automatically setting an appropriate Channel

  • Aireplay issue is resolved during deauthentication stage due to channel settings in airodump

  • SSID selecting during WPA2 hacking is resolved (extra symbol was being added)

  • One import was removed by mistake but now it is resolved.

  • Frame size is enlarged slightly, as it was hiding a button

  • User interaction during Fake Access Points creation. This will let the user to choose the outbout interface for the internet, Evil Twin, Infernal Wireless and Free Internet

  • NAT rules for Fake APs are improved

  • Catch and Error implemented for Infernal Wireless Attack

  • Evil Twin Attack is improved. Now lets the user to choose outbound interface

New Addition:

  • Extra Menu is added to kill airodump-ng from GUI, previously it was shutting down the whole tool.

  • Added a feature to let the user decide how many packets to send for deauthentication during WPA2 Hacking

  • Added a logo

  • During MiTM via Fake AP, you can see the victim's browser live on the GUI panel

  • During MiTM, now you can see the HTTP request and responses live on the GUI panel

FAQ:

I have a problem with connecting to the Database

Solution:

(Thanks to @lightos for this fix)

There seem to be few issues with Database connectivity. The solution is to create a new user on the database and use that user for launching the tool. Follow the following steps.

  1. Delete dbconnect.conf file from the Infernalwireless folder

  2. Run the following command from your mysql console.

    mysql>use mysql;

    mysql>CREATE USER 'root2'@'localhost' IDENTIFIED BY 'enter the new password here';

    mysql>GRANT ALL PRIVILEGES ON \*.\* TO 'root2'@'localhost' WITH GRANT OPTION;

  3. Try to run the tool again.

Release Notes:

New Features:

  • GUI Wireless security assessment SUIT

  • Impelemented

  • WPA2 hacking

  • WEP Hacking

  • WPA2 Enterprise hacking

  • Wireless Social Engineering

  • SSL Strip

  • Report generation

  • PDF Report

  • HTML Report

  • Note taking function

  • Data is saved into Database

  • Network mapping

  • MiTM

  • Probe Request

Changes:

  • Improved compatibility

  • Report improvement

  • Better NAT Rules

Bug Fixes:

  • Wireless Evil Access Point traffic redirect
  • Fixed WPA2 Cracking
  • Fixed Infernal Wireless
  • Fixed Free AP
  • Check for requirements
  • DB implementation via config file
  • Improved Catch and error
  • Check for requirements
  • Works with Kali 2

Coming Soon:

  • Parsing t-shark log files for gathering creds and more

  • More attacks.

Expected bugs:

  • Wireless card might not be supported

  • Might crash on Windows

  • Freeze

  • A lot of work to be done, but this tool is still being developed.

Thanks and Credits:

  • Special thanks to all my friends for comments and feedbacks.

  • Thank you zstyblik a lot for your patches, suggestions and improvements on the tool.

  • Creators:

    • Aircrack

    • SSL Strip

    • Online Community

    • Others whom I forgot to mention.