Releases: v1s1t0r1sh3r3/airgeddon
Releases · v1s1t0r1sh3r3/airgeddon
v11.60
Changelog:
- Added validation to reject multicast BSSID values when manually entered as targets
- Improved Enterprise fake AP compatibility
- Improved cleanup routine to remove temporary files on unexpected script termination
- Modified the lighttpd web server configuration during the Evil Twin captive portal attack to facilitate integration with certain plugins
- Added downgrade attack against WPA2/WPA3 Transitional (Mixed Mode) networks in the WPA3 menu
- Added support for Handshake and PMKID hashcat hash files in the personal offline decryption menu
- Validations added and improved code for all offline decryption attacks
v11.52
Changelog:
- Add WPA3 attacks menu as hookable function to facilitate WPA3 existing plugins integration
- Improved adapter 802.11be standard support detection
- Improved Evil Twin fake APs to add 802.11be if supported by the adapter
- Created an option to avoid using ESSID stripping during Evil Twin attacks
- Enhancements to enterprise certificate analysis and identities capture functionalities
- Small improvements in WEP All-in-One attack
v11.51
Changelog:
- ESSID stripping using invisible char to bypass Apple SSID grouping in Evil Twin attacks
- Improved captive portal's HTML and JS to make it work even in Apple CNA (Captive Network Assistant)
- Modified plugin system to allow multiple hooks from different plugins on functions marked as "hookable"
- Replaced legacy Github Markdown issue creation templates with structured YAML-based forms
- Compatibility extended to Puppy and CachyOS Linux
- Improved internal interface-to-MAC mapping logic for better reliability
- Refactor tool compatibility check to display in columns that adapt dynamically to terminal width for improved readability
v11.50
Changelog:
- Enterprise certificate analysis feature
- Fixed WEP besside-ng attack when hex key contains non-numeric chars
- Added DoS to enterprise identities capture process to improve reliability
- Added functions to simplify hooking menus and hints from plugins
- Added new variables to check support of 802.11n/802.11ac/802.11ax/802.11be standards
- Improved Evil Twin fake APs to add 802.11n/802.11ac/802.11ax if supported by the adapter
- Added support for detecting enterprise networks that report CMAC as their authentication method
- Fixed an issue in some DoS attacks with ESSIDs containing spaces
- Improved BSSID digit randomization to prevent fake AP from using the same MAC address as the original one
- Enhanced captive portal behaviour to avoid detection as suspicious network on Samsung devices
v11.41
Changelog:
- Added a function to simplify hooking language strings from plugins
- Enterprise identities capture feature
- Fixed broken dependency menu validation
- Added a flag to distinguish and validate personal and enterprise networks
- Implemented validations to ensure enterprise attacks are not executed on personal networks and vice versa
- Removed prefix and suffix hint symbols. Now scrambled arabic hint strings are fixed
v11.40
Changelog:
- Code refactor of the heredocs used for the Evil Twin, WEP and WPS attacks
- Standardize xterm parameters and adjust some colors to override the system's default settings
- Fixed bug parsing version number for newer hcxdumptool versions
- Added WEP besside-ng attack
- Added network decloaking feature using two methods
- Changed third available DoS attack (out of DoS attacks menu)
- Fix auto-update check from Docker
v11.31
Changelog:
- Fixed graphics system detection when launched on a headless system using remote X windows
- Fixed minor bug on paths when selecting a directory instead of a file while saving a trophy file
- Improvements on OS/distro detection
- Added feature to know during an Evil Twin captive portal attack, if the client accessed the portal
- Added feature to know during an Evil Twin attack, if the client is still present on the network
- Minor visual improvements on Evil Twin's captive portal
- Improvement on command line while capturing PMKID. Now, faster performance and less default timeout (Thank you to "alexl83")
- Fixed bug on view after a failed asleap attack from offline decryption menu
- Fixed issue on default choice when y/n question is asked while capturing a trap
- Fixed issue to prevent the trap function from being executed multiple times on consecutive Ctrl+C inputs
v11.30
Changelog:
- Added Multi-instance support to launch more than one airgeddon at a time
- Improvements on 5Ghz country code check and 5Ghz band capability detection on adapters
- Fixed bug to avoid set advanced captive portal on second time if is not desired after setting it previously
- Now channel is automatically updated on control window during "DoS pursuit mode" for all Evil Twin attacks
- Fixed error shown while checking if a handshake is wpa2 when wpa3 handshake is captured
v11.22
Changelog:
- Possibility to add manually ESSID name for selected hidden networks
- Improvement on process killing on Evil Twin attacks
- Add WPS version to network selection menu for WPS networks
- Reordered networks on network selection menus (standard and WPS), now networks with the strongest received signal will be placed last to avoid scrolling
- Fixed small bug on Evil Twin captive portal attack for passwords containing more than one space char
- Fixed Docker routing problem
v11.21
Changelog:
- Chinese language translation added (Thank you to "zcbxx")
- Fixed bug parsing cracked PIN on WPS reaver Pixie Dust attack for newer reaver versions
- Fixed error on PMKID capturing due hcxdumptool different params for newer versions using bpf filters
- Fixed error on interfaces and process killing on "DoS pursuit mode"