Skip to content

Commit

Permalink
v1.3
Browse files Browse the repository at this point in the history
  • Loading branch information
sophron committed Apr 15, 2017
1 parent e2c5d45 commit 2477ac6
Show file tree
Hide file tree
Showing 5 changed files with 38 additions and 23 deletions.
19 changes: 15 additions & 4 deletions CHANGELOG
Original file line number Diff line number Diff line change
@@ -1,3 +1,18 @@
Wifiphisher v1.3 [2016-04-15]

o Introduced --quitonsuccess (-qS) option. [@javaes]
o Introduced Travis CI. [@d33tah]
o Install pylint in Travis. [@blackHatMonkey]
o Web server migration to Tornado. Fixes various bugs and increases performance. [@sophron]
o Remove DNS leases after the script restarts. [@laozi999]
o Introduced --internetinterface (-iI) option to provide Internet connectivity to victims. [@sophron]
o Added support for iOS and Android to our network manager imitation template. [@alexsalvetti]
o Introduced a new deauthentication module. [@blackHatMonkey]
o Introduced a new recon module, including new features in target AP selection phase. [@blackHatMonkey]
o Code refactoring including a more modular design. [@sophron]
o Introduced accesspoint module serving as a hostapd wrapper. [@sophron]
o Introducing Lure10, an attack for automatic association against Windows devices. [@sophron]

Wifiphisher v1.2 [2016-12-04]

o Web server now starts after DHCP [@sophron]
Expand All @@ -21,10 +36,6 @@ o Introduced new "Wi-Fi Connect" template. [@dionyziz]

Wifiphisher v1.1 [2015-07-01]

The actual first release of the tool happened on Jan 5 2015. Bugs have been
tackled since then. I consider this a maintenance release (1.1) after the major
release (1.0) that happened back then.

o Fixed compatibility with systems defaulting to python3. [@jaseg]
o Fixed bug with undefined variable (#7). [@yasoob]
o Fixed concatenation error. [@HassenPy]
Expand Down
6 changes: 2 additions & 4 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -132,7 +132,7 @@ A full list of contributors lies <a href="https://github.com/wifiphisher/wifiphi
Wifiphisher is licensed under the GPL license. See [LICENSE](LICENSE) for more information.

## Project Status
Wifiphisher's current version is **1.2**. You can download the latest release from <a href="https://github.com/wifiphisher/wifiphisher/releases/tag/v1.2">here</a>. Otherwise you can get the latest development version by cloning this repository.
Wifiphisher's current version is **1.3**. You can download the latest release from <a href="https://github.com/wifiphisher/wifiphisher/releases/tag/v1.3">here</a>. Otherwise you can get the latest development version by cloning this repository.

## Disclaimer
* Authors do not own the logos under the `wifiphisher/data/` directory. Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research.
Expand All @@ -141,6 +141,4 @@ Wifiphisher's current version is **1.2**. You can download the latest release fr

<b>Note</b>: <a href="htts://wifiphisher.org">wifiphisher.org</a> and this page are the only official pages for wifiphisher. Other sites may be delivering malware.

[![alt text][1.1]][1]
[1.1]: http://i.imgur.com/tXSoThF.png (Follow me)
[1]: http://www.twitter.com/_sophron
For Wifiphisher news, follow me on Twitter: http://www.twitter.com/_sophron
32 changes: 19 additions & 13 deletions docs/wifiphisher.txt
Original file line number Diff line number Diff line change
Expand Up @@ -9,26 +9,13 @@ OPTIONS


-h, --help show this help message and exit
-s SKIP, --skip SKIP Skip deauthing this MAC address. Example: -s
00:11:BB:33:44:AA
-jI JAMMINGINTERFACE, --jamminginterface JAMMINGINTERFACE
Manually choose an interface that supports monitor
mode for deauthenticating the victims. Example: -jI
wlan1
-aI APINTERFACE, --apinterface APINTERFACE
Manually choose an interface that supports AP mode for
spawning an AP. Example: -aI wlan0
-t TIMEINTERVAL, --timeinterval TIMEINTERVAL
Choose the time interval between DEAUTH packets being
sent
-dP DEAUTHPACKETS, --deauthpackets DEAUTHPACKETS
Choose the number of packets to send in each deauth
burst. Default value is 1; 1 packet to the client and
1 packet to the AP. Send 2 deauth packets to the
client and 2 deauth packets to the AP: -p 2
-d, --directedonly Skip the deauthentication packets to the broadcast
address ofthe access points and only send them to
client/AP pairs
-nJ, --nojamming Skip the deauthentication phase. When this option is
used, only one wireless interface is required
-e ESSID, --essid ESSID
Expand All @@ -54,6 +41,25 @@ DESCRIPTION

3. Victim is being served a phishing page (e.g. a realistic router config-looking page). Wifiphisher employs a minimal web server that responds to HTTP & HTTPS requests. As soon as the victim requests a page from the Internet, wifiphisher will respond with a realistic fake page that asks for credentials or forces the victim to download an executable.


EXAMPLES
> wifiphisher -aI wlan0 -jI wlan4 -p firmware-upgrade

Use wlan0 for spawning the rogue Access Point and wlan4 for DoS attacks. Select the target network manually from the list and perform the "Firmware Upgrade" scenario.

Useful for manually selecting the wireless adapters. The "Firware Upgrade" scenario is an easy way for obtaining the PSK from a password-protected network.
> wifiphisher --essid CONFERENCE_WIFI -p plugin_update -pK s3cr3tp4ssw0rd

Automatically pick the right interfaces. Target the Wi-Fi with ESSID "CONFERENCE_WIFI" and perform the "Plugin Update" scenario. The Evil Twin will be password-protected with PSK "s3cr3tp4ssw0rd".

Useful against networks with disclosed PSKs (e.g. in conferences). The "Plugin Update" scenario provides an easy way for getting the victims to download malicious executables (e.g. malwares containing a reverse shell payload).
> wifiphisher --nojamming --essid "FREE WI-FI" -p oauth-login

Do not target any network. Simply spawn an open Wi-Fi network with ESSID "FREE WI-FI" and perform the "OAuth Login" scenario.

Useful against victims in public areas. The OAuth Login scenario provides a simple way for capturing credentials from social networks, like Facebook.


PHISHING SCENARIOS
Wifiphisher supports community-built templates for different phishing scenarios, such as:

Expand Down
2 changes: 1 addition & 1 deletion setup.py
Original file line number Diff line number Diff line change
Expand Up @@ -132,7 +132,7 @@ def get_ifconfig():
KEYWORDS = ["wifiphisher", "evil", "twin", "phishing"]
PACKAGES = find_packages()
INCLUDE_PACKAGE_DATA = True
VERSION = "1.2"
VERSION = "1.3"
ENTRY_POINTS = {"console_scripts": ["wifiphisher = wifiphisher.pywifiphisher:run"]}
INSTALL_REQUIRES = ["PyRIC", "tornado", "blessings>=1.6"]

Expand Down
2 changes: 1 addition & 1 deletion wifiphisher/pywifiphisher.py
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@
reload(sys)
sys.setdefaultencoding('utf8')

VERSION = "1.2GIT"
VERSION = "1.3"
args = 0
mon_MAC = 0
APs = {} # for listing APs
Expand Down

0 comments on commit 2477ac6

Please sign in to comment.