Wireless Attacks Wireless Network

InfernalTwin – This Is Evil Twin Attack Automated [Wireless Hacking]

InfernalTwin – This Is Evil Twin Attack Automated  [Wireless Hacking]

This tool is created to aid the penetration testers in assessing wireless security. Author is not responsible for misuse. Please read instructions thoroughly.

Usage:

(from the same folder where your code exists)

Note: Please make sure to run the ‘configure under File menu to install required software’

FAQ:
I have a problem with connecting to the Database
Solution:
There seem to be few issues with Database connectivity. The solution is to create a new user on the database and use that user for launching the tool. Follow the following steps.

  • Delete dbconnect.conf file from the Infernalwireless folder
  • Run the following command from your mysql console.

  • Try to run the tool again.

 

Release Notes:
New Features:

  • GUI Wireless security assessment SUIT
  • Impelemented
  • WPA2 hacking
  • WEP Hacking
  • WPA2 Enterprise hacking
  • Wireless Social Engineering
  • SSL Strip
  • Report generation
  • PDF Report
  • HTML Report
  • Note taking function
  • Data is saved into Database
  • Network mapping
  • MiTM
  • Probe Request

Changes:

  • Improved compatibility
  • Report improvement
  • Better NAT Rules

Bug Fixes:

  • Wireless Evil Access Point traffic redirect
  • Fixed WPA2 Cracking
  • Fixed Infernal Wireless
  • Fixed Free AP
  • Check for requirements
  • DB implementation via config file
  • Improved Catch and error
  • Check for requirements
  • Works with Kali 2

 

Coming Soon:

  • Parsing t-shark log files for gathering creds and more
  • More attacks.

Expected bugs:

  • Wireless card might not be supported
  • Windodw might crash
  • Freeze
  • A lot of work to be done, but this tool is still being developed.

Download Infernal-Twin at Github Repo

 

I started blogging around 2011 at #Ubuntupirates, #ProjectX and #pir8geek, I’m currently working as Network/Linux SysAdmin.

I’m a Linux,opensource advocate and interested in network security and InfoSec.

Leave a Reply