How is that for rapid development? Having more than one person working on a project is really starting to ramp up what SET is all about. This release has a completely rewritten and stable Wireless Attack Vector written by pr1me, some major bug fixes, and additions to the MSSQL bruter within Fast-Track. The wireless attack vector will now properly redirect victims back to the SET attack machine and have a full fledged fake wireless access point.
Changelog below:
~~~~~~~~~~~~~~~~
version 2.4
~~~~~~~~~~~~~~~~
* Rehauled the fake ap attack for menu style and stability
* Added the option for fake ap attack to use either a 10.0.0.0 or 192.168.10.0 IP ranges
* Added commands to properly bring up tun interface in fake ap attack
* Added variables to the dhcp3 launch command for stability
* Added some color styling to the check_length error message
* Fixed a minor code issue in stop_wifiattack.py
* Fixed a minor issue that caused the log file to error out if file was not found
* Added a descrpition if no MSSQL servers were identified during a scan
* Fixed a bug that would brute force a null IP address
* Fixed a bug in the man left in the middle that would cause it to error out