```
Infernal Twin: A Python Suite for Automated Wireless Hacking
Wireless hacking is a challenging and rewarding activity for penetration testers, but it can also be time-consuming and complex. There are many tools and techniques available for wireless hacking, but not all of them are easy to use or effective. One of the most common wireless attacks is the Evil Twin attack, which involves creating a fake access point that mimics a legitimate one and luring unsuspecting users to connect to it. Once connected, the attacker can perform various malicious activities such as stealing credentials, redirecting traffic, injecting malware, etc.
Infernal Twin – Automatic Wifi Hacking Tool
However, setting up and executing an Evil Twin attack manually can be tedious and error-prone. It requires multiple steps such as scanning for wireless networks, selecting a target network, creating a fake access point, configuring a web server, modifying a login page, setting up a network address translation (NAT) table, capturing and analyzing network traffic, etc. Moreover, the attacker has to monitor and manage all these components simultaneously, which can be overwhelming and distracting.
This is where Infernal Twin comes in handy. Infernal Twin is an automated penetration testing tool developed by entropy1337 to evaluate wireless security with an automated Evil Twin attack. It is a Python suite that automates many of the common tasks involved in wireless hacking and provides a graphical user interface (GUI) for easy control and visualization. Infernal Twin can perform the following functions:
Scan wireless networks in range and display information such as SSID, channel, encryption type, MAC address, signal strength, etc.
Connect to a selected target network and obtain the login page of authentication (if any).
Modify the login page with an attacker-controlled PHP script to capture the credentials entered by the users.
Set up an Apache web server and serve the fake login page to the users who connect to the fake access point.
Assign an IP address to the users who connect to the fake access point and set up a NAT table to route their traffic through the attacker's machine.
Capture and dump the network traffic for further analysis.
Integrate with other tools such as SSL Strip, Metasploit, airgraph-ng, etc. for additional functionality.
Generate reports in PDF or HTML format with details of the attack and captured data.
Infernal Twin is designed to aid penetration testers in assessing wireless security and identifying vulnerabilities. It is not intended for malicious or illegal purposes. The author is not responsible for any misuse or damage caused by this tool. Please read the instructions thoroughly before using it.
Infernal Twin is compatible with Kali Linux 2018 and requires Python 2.7 and some dependencies such as Apache2, MySQL-server, Scapy, Wxtools, Mysqldb, Aircrack-ng, etc. It can be downloaded from GitHub: https://github.com/entropy1337/infernal-twin
To use Infernal Twin, simply run the following command from the same folder where the code exists:
python InfernalWireless.py
You will see a GUI with different tabs for different functions. You can follow the steps below to perform an automated Evil Twin attack:
Select the \"Scan\" tab and click on \"Scan Wireless Network\". You will see a list of wireless networks in range. Select a target network and click on \"Connect\".
If the target network has a login page for authentication, you will see it in the \"Login Page\" tab. You can modify it with your own PHP script to capture the credentials entered by the users. The default script is located in Modules/LoginPage.php.
Select the \"Fake AP\" tab and click on \"Start Fake AP\". You will see a message that says \"Fake AP Started\". You can also change the SSID and channel of the fake access point if you want.
Select the \"Web Server\" tab and click on \"Start Web Server\". You will see a message that says \"Web Server Started\". This will serve the fake login page to the users who connect to the fake access point.
Select the \"DH c481cea774