- THE PREVIOUS VERSION (v2.10 & 2.20) WERE RELEASED ON GITHUB AS PRIVATE REPOS
- YET I HAVE UPLOADED ALL THE NEW FEATURES AND BUG FIXES
- THIS IS MY FIRST PUBLIC REPO SO PLEASE DO SHARE FEEDBACK
- For any comments and suggestions DM me on Discord - (error_434#6498)
Release 3
- Improved and Compatibility on Kali Linux 2018
- Added Visual Representation of Wireless Scan
- Added Visual Representation of Probe Requests and Map per SSID requested by Devices
- Updated MAC address mapping
- Added MAC address mappting on probe request devices
- Evil Twin Attack on WPA2 PSK (with provided credentials)
- Development Testing of Automated Wireless Scan Wizard
- MiTM improvement and integration with Metasploit
- Improved Social Engineering Aspects over Wireless Network
- Added Beacon signal on wireless scan results
- Organized File Structure and Layout of the tool
- Created dedicated Folder for Logs and management
Release 2.20
- Menu to retrieve logs are added
Release 2.10
- Added BeeF XSS framework Integration
- Added HTTP Traffic View within tool
- Improved Infenral Wireless Attack
- Visual View of some of the panel improved
- Improved Basic Authentication during Social engineering assessment over wireless network
- Non ASCII SSID Name used to crash the software. It is fixed now
- Warnings on the background is supressed
- New Experimental Section is added but under development
- Better User Interface
- More Network device controls
- Better SSL Strip Control
- User / Access Point Deauthentication with auto channel detection of AP
- Extra Wireless Scanner to detect Probe Requests, wireless Network scan and connections to AP detection
- airgraph-ng suite is better implemented
- WPA2 Hacking UI is changed for better control over the attack
- WPA2 Enterprise Hacking UI is changed for better control over the attack
- Custome Fake Access Point is implemented. Freenet AP is deleted now.
- Check for software updates
- Wiki page with video links to attacks tutorials
- Folder are more structured
- Check for prerequesites automatically
I have a problem with connecting to the Database (no longer expected to occur since I've fixed in the latest release)
There seem to be few issues with Database connectivity. The solution is to create a new user on the database and use that user for launching the tool. Follow the following steps.
-
Delete dbconnect.conf file from the Infernalwireless folder
-
Run the following command from your mysql console.
mysql>
use mysql;
mysql>
CREATE USER 'root2'@'localhost' IDENTIFIED BY 'enter the new password here';
mysql>
GRANT ALL PRIVILEGES ON \*.\* TO 'root2'@'localhost' WITH GRANT OPTION;
-
Try to run the tool again.
- GUI Wireless security assessment SUIT
- Impelemented
- WPA2 hacking
- WEP Hacking
- WPA2 Enterprise hacking
- Wireless Social Engineering
- SSL Strip
- Report generatio
- PDF Report
- HTML Report
- Note taking function
- Data is saved into Database
- Network mapping
- MiTM
- Probe Request
- Improved compatibility
- Report improvement
- Better NAT Rules
- Wireless Evil Access Point traffic redirect
- Fixed WPA2 Cracking
- Fixed Infernal Wireless
- Fixed Free AP
- Check for requirements
- DB implementation via config file
- Improved Catch and error
- Check for requirements
- Works with Kali 2
- Parsing t-shark log files for gathering creds and more
- More attacks.
- Might crash on Windows(It is no longer expectd in the latest release.Yet I'm includiing this here so that I can make sure bout it )
- Freeze