WiFi-Pumpkin – Framework for Rogue Wi-Fi Access Point Attack

“The quieter you become, the more you can hear” This is the motto invented by Kali pentest developers. Kali system include several tools for wireless penetration testing and war-driving and at the same time you can add on it any other program that you feel required to improve your exploitation framework. When you are going to test wifi network you should listen to the broadcast to identify the AP target. If you are looking to pentest wireless network you can check WiFi-Pumpkin.

WiFi-Pumpkin is a rogue AP framework to easily create these fake networks, all while forwarding legitimate traffic to and from the unsuspecting target. It comes stuffed with features, including rogue Wi-Fi access points, deauth attacks on client APs, a probe request and credentials monitor, transparent proxy, Windows update attack, phishing manager, ARP Poisoning, DNS Spoofing, Pumpkin-Proxy, and image capture on the fly. moreover, the WiFi-Pumpkin is a very complete framework for auditing Wi-Fi security check the list of features is quite broad.

WiFi-Pumpkin - Framework for Rogue Wi-Fi Access Point Attack

WiFi-Pumpkin – Framework for Rogue Wi-Fi Access Point Attack

Current supported features are:

  • Rogue Wi-Fi Access Point
  • Deauth Attack Clients AP
  • Probe Request Monitor
  • DHCP Starvation Attack
  • Credentials Monitor
  • Transparent Proxy
  • Windows Update Attack
  • Phishing Manager
  • Partial Bypass HSTS protocol
  • Support beef hook
  • ARP Poison
  • DNS Spoof
  • Patch Binaries via MITM
  • Karma Attacks (support hostapd-mana)
  • LLMNR, NBT-NS and MDNS poisoner (Responder)
  • Pumpkin-Proxy (ProxyServer (mitmproxy API))
  • Capture images on the fly
  • TCP-Proxy (with scapy)

You can read more and download this tool over here: https://github.com/P0cL4bs/

Notify of
Inline Feedbacks
View all comments