WiFi-Pickle (https://govanguard.io)
Shane Scott
Based on WiFi-Pumpkin, WiFi-Pickle is a tool for rogue WiFi access point attacks.
WiFi-Pickle is written in Python 3.6, has been partially ported from PyQt4 to PyQt5, and no longer uses ancient and arcane libraries.
Tested on Ubuntu, Parrot Security OS, and Windows Subsystem for Linux. Some features do not work on WSL and not all wireless adapters are compatible.
- HTTP / HTTPS + SSL Strip over MITMProxy 4.0.4
- TCP Proxy for 80, 443 and 8080. Image Capture for both HTTP and HTTPS where SSL Strip has been effective (not all sites are vulnerable to this)
- meatGlue DNS Proxy for DNS spoofing, rewrites, etc
- All deprecated, irrelevant and ineffective attacks removed
git clone https://github.com/GoVanguard/wifi-pickle.git
WiFi-Pickle supports Python 3.6+. It won't run in anything below Python 3.6. Don't even bother trying.
- Ubuntu or variant
- Python 3.6+
- mitmproxy 4.0.4+
- PyQT4 (Soon PyQT5)
- six, Twisted
Run sudo ./startWifiPickle to launch WiFi-Pickle. You may first have to grant yourself the permission to execute the script, which can either be done by right clicking it and selecting Properties and enabling Execute permissions, or:
chmod +x startWifiPickle.sh
Then run startLegion as root:
sudo ./startWifiPickle.sh
Notes:
- Requires Python 3.6. Installer for Python3.6 provided under ./deps if your distro doesn't have it
- Run installDeps.sh to install Python libraries
- Requires the exit line in console/master.py of MITMProxy 4.0.4 to be commented out
WiFi-Pickle is licensed under the GNU General Public License v3.0.
Marcos Nesster - PocL4bs Team (WiFi-Pumpkin)