InfoSec Forums InfoSec Forums Wireless Penetration Testing [Collection] Wireless Penetration Testing Toolkit

This topic contains 1 reply, has 2 voices, and was last updated by  whitehat 3 months ago.

  • Author
  • #3190
    do son
    do son
    • Topics:202
    • Comments:51
    • Super Member
    • ★★★★
    1. wifite
      Link Project:
      wifite written by py a wireless security testing tools, which is essentially a combination of command-line aircrack-ng, reaver, pyrit, cowpatty, tshark and several other tools, but it simplifies the process of interaction between the tools and the the command line just one button to start with a detailed description and guide the process, so ease of use is very prominent.
    2. wifiphisher
      Link Project:
      With a relatively novel idea I get malicious wifi connection password. The software will ask you to use two wireless network card, a target for AP initiation Deauth, the client is disconnected, the other LAN users to build the same SSID AP, so that the client and make it even come when you want to connect internet, forced redirection to a phishing page (can be customized). For card compatibility, it also performed well.
    3. wifi-pumpkin
      Link Project:
      Very friendly graphic user interface, good handling, my favorite one is the establishment of phishing wifi attack tools, rich functional interface, ease of use is excellent. Compatibility is also very good. Researcher  is actively update them, we can continue to focus on this fun project.
    4. fruitywifi
      Link Project:
      FruityWifi is an open source tool to audit wireless networks, also uses the web as an interactive interface, ease of use features buttons and plug-ins rich.
    5. mama toolkit
      Link Project:
      which regarded the pace of a set of functions, the use of net-creds, sslstrip rogue ap achieve the middle attack.
    6. 3vilTwinAttacker
      Link Project:
      Much like wifi-pumpkin interface. Has a good graphical interface, the overall experience is very good, good ease of use. Good compatibility. Researcher has hardly been updated.
    7. ghost-phisher
      Link Project:
      It has a good graphical interface, but almost no fault tolerance, many options easily confusing, but the overall feeling is still very good use. It can be a key to establish rogue ap, and protect dhcp, dns services interface, easy to launch a variety of middle attack, ease of use is good. Compatible good. Kali has been made official team updated original repo

    No system is truly secure!

  • #3194

    • Topics:
    • Comments:
    • Newbie

    Perhap, you forget to list “infernal-twin” tool.

    GUI Wireless security assessment SUIT


    WPA2 hacking

    WEP Hacking

    WPA2 Enterprise hacking

    Wireless Social Engineering

    SSL Strip

    Report generation

    PDF Report

    HTML Report

    Note taking function

    Data is saved into Database

    Network mapping


    Probe Request

    Check here:

You must be logged in to reply to this topic.