forked from s0lst1c3/eaphammer
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Changelog
58 lines (47 loc) · 2.59 KB
/
Changelog
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
0.0.1 - Gabriel Ryan <gryan@gdssecurity.com>
Initial release.
0.0.2 - Gabriel Ryan <gryan@gdssecurity.com>
Added Changelog.
Added tqdm to pip.req file.
Added python-pip to kali-dependencies.txt.
Added version string to ./eaphammer
Updated README to reflect changes.
0.0.3 - Gabriel Ryan <gryan@gdssecurity.com>
Removed submodules, updated setup.py to reflect this.
0.0.4 - Gabriel Ryan <gryan@gdssecurity.com>
Updated to use local copy of s0lst1c3/hostapd-eaphammer (hostapd-wpe without Cupid and Karma, uses latest openssl, uses hostapd-2.6)
Moved version string from ./eaphammer to ./config.py.
Updated kali-dependencies.txt.
Updated setup.py.
Updated README to reflect changes.
0.0.5 - Gabriel Ryan <gryan@gdssecurity.com>
Certs are now signed using sha256 to ensure compatibility with current versions of OpenSSL.
wlan_clean() in core/utils.py now properly raises network interface after stopping NetworkManager.
Updated version string in ./config.py.
0.0.6 - Gabriel Ryan <gryan@gdssecurity.com>
Added WPASupplicant service to core utilities.
Eaphammer now stops wpa_supplicant service.
Updated version string in ./config.py.
0.0.7 - Gabriel Ryan <gryan@gdssecurity.com>
Daemons now log to [project root]/logs directory.
Dsniff's dnsspoof has been retired in favor dnsmasq.
Integrated redirect server added for hostile portal attacks (see core/servers/redirect_server.py).
Dnsmasq's config files are now managed by core.conf_manager.
Dnsmasq DHCP Only and Captive Portal configurations have been improved.
Responder now works swimmingly.
Updated mainline logic for Captive Portal and Hostile Portal modes of operation (see eaphammer).
Support for dnsmasq's dhcp-script option added.
0.0.8 - Gabriel Ryan <gryan@gdssecurity.com>
Hostile portal attacks have been improved.
Added autocrack and add functionality to support full EAP authentication.
No longer kills NetworkManager. Uses nmcli to set interfaces to "unmanaged" instead.
Added support for indirect wireless pivots (disable's Responder's SMB server so you can run MultiRelay, smbrelayx, etc).
Added payload_generator script to generate timed Powershell payloads for indirect wireless pivots (note: timed payload is for PoC purposes. If you're doing it for real, use a CobaltStrike beacon, Empire agent, or other respectable implant instead).
0.0.9 - Gabriel Ryan <gryan@gdssecurity.com>
Added ehdb script for updating and managing eap_user file.
0.1.0 - Gabriel Ryan <gryan@gdssecurity.com>
Added major expansion to documentation (README.md).
0.1.1 - Gabriel Ryan <gryan@gdssecurity.com>
Added support for ESSID cloaking.
0.1.2 - Gabriel Ryan <gryan@gdssecurity.com>
Code cleanup.