forked from s0lst1c3/eaphammer
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Changelog
64 lines (51 loc) · 2.9 KB
/
Changelog
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
0.0.1 - Gabriel Ryan <[email protected]>
Initial release.
0.0.2 - Gabriel Ryan <[email protected]>
Added Changelog.
Added tqdm to pip.req file.
Added python-pip to kali-dependencies.txt.
Added version string to ./eaphammer
Updated README to reflect changes.
0.0.3 - Gabriel Ryan <[email protected]>
Removed submodules, updated setup.py to reflect this.
0.0.4 - Gabriel Ryan <[email protected]>
Updated to use local copy of s0lst1c3/hostapd-eaphammer (hostapd-wpe without Cupid and Karma, uses latest openssl, uses hostapd-2.6)
Moved version string from ./eaphammer to ./config.py.
Updated kali-dependencies.txt.
Updated setup.py.
Updated README to reflect changes.
0.0.5 - Gabriel Ryan <[email protected]>
Certs are now signed using sha256 to ensure compatibility with current versions of OpenSSL.
wlan_clean() in core/utils.py now properly raises network interface after stopping NetworkManager.
Updated version string in ./config.py.
0.0.6 - Gabriel Ryan <[email protected]>
Added WPASupplicant service to core utilities.
Eaphammer now stops wpa_supplicant service.
Updated version string in ./config.py.
0.0.7 - Gabriel Ryan <[email protected]>
Daemons now log to [project root]/logs directory.
Dsniff's dnsspoof has been retired in favor dnsmasq.
Integrated redirect server added for hostile portal attacks (see core/servers/redirect_server.py).
Dnsmasq's config files are now managed by core.conf_manager.
Dnsmasq DHCP Only and Captive Portal configurations have been improved.
Responder now works swimmingly.
Updated mainline logic for Captive Portal and Hostile Portal modes of operation (see eaphammer).
Support for dnsmasq's dhcp-script option added.
0.0.8 - Gabriel Ryan <[email protected]>
Hostile portal attacks have been improved.
Added autocrack and add functionality to support full EAP authentication.
No longer kills NetworkManager. Uses nmcli to set interfaces to "unmanaged" instead.
Added support for indirect wireless pivots (disable's Responder's SMB server so you can run MultiRelay, smbrelayx, etc).
Added payload_generator script to generate timed Powershell payloads for indirect wireless pivots (note: timed payload is for PoC purposes. If you're doing it for real, use a CobaltStrike beacon, Empire agent, or other respectable implant instead).
0.0.9 - Gabriel Ryan <[email protected]>
Added ehdb script for updating and managing eap_user file.
0.1.0 - Gabriel Ryan <[email protected]>
Added major expansion to documentation (README.md).
0.1.1 - Gabriel Ryan <[email protected]>
Added support for ESSID cloaking.
0.1.2 - Gabriel Ryan <[email protected]>
Code cleanup.
0.1.3 - Gabriel Ryan <[email protected]>
EAPHammer now displays captured MS-CHAPv2 challenge / response pairs in Hashcat format.
0.1.4 - Gabriel Ryan <[email protected]>
Fixed issue where setup script was unable to download rockyou wordlist due to: https://github.com/danielmiessler/SecLists/issues/166