wifipumpkin3 v1.1.4 releases: Powerful framework for rogue access point attack
Wifipumpkin3
wifipumpkin3 is a powerful framework for rogue access point attack, written in Python, that allows and offers to security researchers, red teamers, and reverse engineers to mount a wireless network to conduct a man-in-the-middle attack.
Main Features
- Rogue access point attack
- Man-in-the-middle attack
- Rogue Dns Server
- Captive portal attack (captiveflask)
- Intercept, inspect, modify and replay web traffic
- WiFi networks scanning
- DNS monitoring service
- Credentials harvesting
- Transparent Proxies
- LLMNR, NBT-NS, and MDNS poisoner (Responder3)
- and more!
Changelog v1.1.4
Added
- added: pydnsserver on verbose mode and settings dhcpmode variable
- added: new feature captiveflask force redirect user after login to any website
- added: karma wireless mode hostapd-wpe
Changed
- changed: replace flask-restx to flask-restful backend api
- updated: changelog version with new commits
- changed: redirect to login_sucessful.html by default
- Create PULL_REQUEST_TEMPLATE.md
Removed
- removed: plugin replace image from pumpkinproxy
Install && Use
Copyright (C) 2020 P0cL4bs