Wireless Attacks Wireless Network

InfernalTwin – This Is Evil Twin Attack Automated [Wireless Hacking]

InfernalTwin – This Is Evil Twin Attack Automated  [Wireless Hacking]

This tool is created to aid the penetration testers in assessing wireless security. Author is not responsible for misuse. Please read instructions thoroughly.


(from the same folder where your code exists)

Note: Please make sure to run the ‘configure under File menu to install required software’

I have a problem with connecting to the Database
There seem to be few issues with Database connectivity. The solution is to create a new user on the database and use that user for launching the tool. Follow the following steps.

  • Delete dbconnect.conf file from the Infernalwireless folder
  • Run the following command from your mysql console.

  • Try to run the tool again.


Release Notes:
New Features:

  • GUI Wireless security assessment SUIT
  • Impelemented
  • WPA2 hacking
  • WEP Hacking
  • WPA2 Enterprise hacking
  • Wireless Social Engineering
  • SSL Strip
  • Report generation
  • PDF Report
  • HTML Report
  • Note taking function
  • Data is saved into Database
  • Network mapping
  • MiTM
  • Probe Request


  • Improved compatibility
  • Report improvement
  • Better NAT Rules

Bug Fixes:

  • Wireless Evil Access Point traffic redirect
  • Fixed WPA2 Cracking
  • Fixed Infernal Wireless
  • Fixed Free AP
  • Check for requirements
  • DB implementation via config file
  • Improved Catch and error
  • Check for requirements
  • Works with Kali 2


Coming Soon:

  • Parsing t-shark log files for gathering creds and more
  • More attacks.

Expected bugs:

  • Wireless card might not be supported
  • Windodw might crash
  • Freeze
  • A lot of work to be done, but this tool is still being developed.

Download Infernal-Twin at Github Repo


I started blogging around 2011 at #Ubuntupirates, #ProjectX and #pir8geek, I’m currently working as Network/Linux SysAdmin.

I’m a Linux,opensource advocate and interested in network security and InfoSec.

Leave a Reply