基于 wifipumpkin3 制作的校园网钓鱼wifi,仅供学习使用,严禁用于非法用途
虽然十分简陋很容易一眼看出异常,但是保不齐真有人上当,请勿用于攻击
在 captiveflask的基础上增加了CAS代理认证,实现了中间人攻击
Run the demo:
sudo wifipumpkin3 --pulp ./SUSTC_fishing.pulp
Powerful framework for rogue access point attack.
wifipumpkin3 is powerful framework for rogue access point attack, written in Python, that allow and offer to security researchers, red teamers and reverse engineers to mount a wireless network to conduct a man-in-the-middle attack.
- Rogue access point attack
- Man-in-the-middle attack
- Module for deauthentication attack
- Module for extra-captiveflask templates
- Rogue Dns Server
- Captive portal attack (captiveflask)
- Intercept, inspect, modify and replay web traffic
- WiFi networks scanning
- DNS monitoring service
- Credentials harvesting
- Phishkin3 (Support MFA phishing attack via captive portal)
- EvilQR3 (Support Phishing QR code attack)
- Transparent Proxies
- RestFulAPI (new)
- and more!
1HBXz6XX3LcHqUnaca5HRqq6rPUmA3pf6f
- Python: you need Python 3.8 or later to run Wp3.
- Operating System:
- a recent version of Linux (we tested on Ubuntu 22.04 LTS);
- please note: Windows is not supported.
Learn more about using wp3 on the official site!
See CONTRIBUTING.md for how to help out.
on discord: https://discord.gg/jywYskR
Wp3 is licensed under the Apache 2.0.