You are here: Home » Wireless Attacks » infernal-twin


infernal-twin Description

This tool is created to aid the penetration testers in assessing wireless security. Author is not responsible for misuse. Please read instructions thoroughly.

Evil twin is a term for a rogue Wi-Fi access point that appears to be a legitimate one offered on the premises, but actually has been set up to eavesdrop on wireless communications. An evil twin is the wireless version of the phishing scam. An attacker fools wireless users into connecting a laptop or mobile phone to a tainted hotspot by posing as a legitimate provider.

This type of evil twin attack may be used to steal the passwords of unsuspecting users by either snooping the communication link or by phishing, which involves setting up a fraudulent web site and luring people there

What this tool will do ?

  1. Set up monitoring interface
  2. Set up DB
  3. Scan wireless network in the range
  4. Connect to the network selected SSID
  5. Obtain login page of authentication
  6. Modify the login page with attacker controlled php script to obtain the credentials
  7. Set up Apache Server and serve fake login page
  8. Give a victim an IP
  9. Set up NAT table
  10. Dump the traffic


Author: entropy1337

License: GPLv3

infernal-twin Usage Example

sudo python2

How to install infernal-twin

git clone
cd infernal-twin
sudo python2

infernal-twin Screenshots




infernal-twin Tutorials