Releases: FLOCK4H/Freeway
1.5.0.42
- Added
Arsenal
-> Add and manage your own tools in the script, now you can launch your script inside Freeway, or check out some mine:
- CSASpam -> We try to make an AP use 5GHz band by blocking all 2.4GHz channels
- DeauthNote -> Flood APs with deauth frames, spam malformed beacon frames to clients
- Freeway now starts up much faster due to time delay removals
- Modified main UI
- Reworked logo
1.4.0
Now you can generate summary of packet monitoring, for professional pentesting purposes.
- Switched to
readline
for better input handling. - Improved input error management.
- Added
-r
option to Packet Monitor for saving results of the scan into a summary file. - Modified
monitor.py
.
1.3.0
1.2.4
1.2.1
1.2.0
No more git pull origin main
for updates, Freeway will handle this from now, in the script, it checks if there is a tag at
https://api.github.com/repos/{GITHUB_REPO}/releases/latest
different than the one in the current code repo, then proceeds with git pull origin main
for us.
1.1.2
Tip
You need an external WiFi adapter or in total: 2 adapters, because on one you host the Evil Twin Access Point (AP), and the second one must remain connected to any WiFi in order to provide internet (the WiFi can also be connected when attack has already started, it will fix rerouting).
1.1.2
Incorporating the Evil Twin attack, now you can create an AP with captive portal using your own, or one from 4 default templates, HTML website.
Note
JavaScript might be disabled on some devices.
- Change AP's Mac and ESSID to masquerade into other AP
- Harvest Credentials directly to the console, automating hostapd, dnsmasq, and lighttpd
- Use your own imagination to create templates
- The Evil Twin is configurable in menu or
/usr/local/share/3way/_config
file for manual configuration. - If default IP and it's range:
10.0.0.15
and10.0.0.20-150
is taken (busy), please change to one of other private IP class (e.g.,192.168.1.1
,172.16.1.1
).