Showing posts with label wireless. Show all posts
Showing posts with label wireless. Show all posts
PwnStar latest version with new Exploits released
Labels:
Hacking Tools,
Linux,
Network Hacking,
Wi-Fi Hacking,
wireless
A bash script to launch a Soft AP, configurable with a wide variety of attack options. Includes a number of index.html and server php scripts, for sniffing/phishing. Can act as multi-client captive portal using php and iptables. Launches classic exploits such as evil-PDF. De-auth with aireplay, airdrop-ng or MDK3.
- “hotspot_3″ is a simple phishing web page, used with basic menu option 4.
- “portal_simple” is a captive portal which allows you to edit the index.html with the name of the portal eg “Joe’s CyberCafe”. It is used for sniffing.
- “portal_hotspot3″ phishes credentials, and then allows clients through the portal to the internet
- “portal_pdf” forces the client to download a malicious pdf in order to pass through the portal
- captive-portal with iptables and php
- more php scripts added
- exploits added
- mdk3 and airdrop deauth
- manage interfaces and MACspoofing
- set up sniffing
- serve up phishing or malicious web pages
- launch karmetasploit
- grab WPA handshakes
- de-auth clients
- manage IPtables
Subscribe to our Daily Newsletter via email - Be First to know about Security and Penetration testing tools. or Join our Huge Hackers Community on Facebook , Google+ and Twitter .
Subscribe Top Hacker Stories via email
Posted by Mohit Kumar at Saturday, November 10, 2012
Spooftooph 0.5.2 - Automated spoofing or cloning Bluetooth device
Labels:
bluetooth,
cloning,
Hacking Tools,
penetration testing,
Wi-Fi Hacking,
wireless
Spooftooph is designed to automate spoofing or cloning Bluetooth device Name, Class, and Address. Cloning this information effectively allows Bluetooth device to hide in plain site. Bluetooth scanning software will only list one of the devices if more than one device in range shares the same device information when the devices are in Discoverable Mode (specificaly the same Address).
Features
- Clone and log Bluetooth device information
- Generate a random new Bluetooth profile
- Change Bluetooth profile every X seconds
- Specify device information for Bluetooth interface
- Select device to clone from scan log
1) Specify NAME, CLASS and ADDR.
root@thnlab: spooftooph -i hci0 -n new_name -a 00:11:22:33:44:55 -c 0x1c010c
2) Randomly generate NAME, CLASS and ADDR.
root@thnlab: spooftooph -i hci0 -R
3) Scan for devices in range and select device to clone. Optionally dump the device information in a specified log file.
root@thnlab: spooftooph -i hci0 -s -w file.csv
4) Load in device info from log file and specify device info to clone.
root@thnlab: spooftooph -i hci0 -r file.csv
5) Clone a random devices info in range every X seconds.
root@thnlab: spooftooph -i hci0 -t 10
Download Spooftooph 0.5.2
Subscribe to our Daily Newsletter via email - Be First to know about Security and Penetration testing tools. or Join our Huge Hackers Community on Facebook , Google+ and Twitter .
Subscribe Top Hacker Stories via email
Posted by Mohit Kumar at Saturday, November 03, 2012
Wifi Honey - Creates fake APs using all encryption
Labels:
Hacking Tools,
penetration testing,
script,
Security Tools,
Shell Code,
Wi-Fi Hacking,
wireless
This is a script, attack can use to creates fake APs using all encryption and monitors with Airodump. It automate the setup process, it creates five monitor mode interfaces, four are used as APs and the fifth is used for airdump-ng. To make things easier, rather than having five windows all this is done in a screen session which allows you to switch between screens to see what is going on. All sessions are labelled so you know which is which.
Installing wifi honey
chmod a+x wifi_honey.sh
./wifi_honey.sh fake_wpa_net
./wifi_honey.sh fake_wpa_net 1 waln1
Download Wifi Honey
Subscribe to our Daily Newsletter via email - Be First to know about Security and Penetration testing tools. or Join our Huge Hackers Community on Facebook , Google+ and Twitter .
Subscribe Top Hacker Stories via email
Posted by Mohit Kumar at Saturday, November 03, 2012
Subscribe to:
Posts (Atom)