[Collection] Wireless Penetration Testing Toolkit
This topic contains 1 reply, has 2 voices, and was last updated by whitehat 3 months ago.
October 25, 2016 at 10:16 am #3190
- Super Member
Link Project: https://github.com/derv82/wifite
wifite written by py a wireless security testing tools, which is essentially a combination of command-line aircrack-ng, reaver, pyrit, cowpatty, tshark and several other tools, but it simplifies the process of interaction between the tools and the the command line just one button to start with a detailed description and guide the process, so ease of use is very prominent.
Link Project: https://github.com/sophron/wifiphisher
With a relatively novel idea I get malicious wifi connection password. The software will ask you to use two wireless network card, a target for AP initiation Deauth, the client is disconnected, the other LAN users to build the same SSID AP, so that the client and make it even come when you want to connect internet, forced redirection to a phishing page (can be customized). For card compatibility, it also performed well.
Link Project: https://github.com/P0cL4bs/WiFi-Pumpkin
Very friendly graphic user interface, good handling, my favorite one is the establishment of phishing wifi attack tools, rich functional interface, ease of use is excellent. Compatibility is also very good. Researcher is actively update them, we can continue to focus on this fun project.
Link Project: https://github.com/xtr4nge/FruityWifi
FruityWifi is an open source tool to audit wireless networks, also uses the web as an interactive interface, ease of use features buttons and plug-ins rich.
- mama toolkit
Link Project: https://github.com/sensepost/mana
which regarded the pace of a set of functions, the use of net-creds, sslstrip rogue ap achieve the middle attack.
Much like wifi-pumpkin interface. Has a good graphical interface, the overall experience is very good, good ease of use. Good compatibility. Researcher has hardly been updated.
Link Project: http://tools.kali.org/information-gathering/ghost-phisher
It has a good graphical interface, but almost no fault tolerance, many options easily confusing, but the overall feeling is still very good use. It can be a key to establish rogue ap, and protect dhcp, dns services interface, easy to launch a variety of middle attack, ease of use is good. Compatible good. Kali has been made official team updated original repo
No system is truly secure!
October 25, 2016 at 2:44 pm #3194
Perhap, you forget to list “infernal-twin” tool.
GUI Wireless security assessment SUIT
WPA2 Enterprise hacking
Wireless Social Engineering
Note taking function
Data is saved into Database
You must be logged in to reply to this topic.