Releases: v1s1t0r1sh3r3/airgeddon
Releases · v1s1t0r1sh3r3/airgeddon
v11.52
Changelog:
- Add WPA3 attacks menu as hookable function to facilitate WPA3 existing plugins integration
- Improved adapter 802.11be standard support detection
- Improved Evil Twin fake APs to add 802.11be if supported by the adapter
- Created an option to avoid using ESSID stripping during Evil Twin attacks
- Enhancements to enterprise certificate analysis and identities capture functionalities
- Small improvements in WEP All-in-One attack
v11.51
Changelog:
- ESSID stripping using invisible char to bypass Apple SSID grouping in Evil Twin attacks
- Improved captive portal's HTML and JS to make it work even in Apple CNA (Captive Network Assistant)
- Modified plugin system to allow multiple hooks from different plugins on functions marked as "hookable"
- Replaced legacy Github Markdown issue creation templates with structured YAML-based forms
- Compatibility extended to Puppy and CachyOS Linux
- Improved internal interface-to-MAC mapping logic for better reliability
- Refactor tool compatibility check to display in columns that adapt dynamically to terminal width for improved readability
v11.50
Changelog:
- Enterprise certificate analysis feature
- Fixed WEP besside-ng attack when hex key contains non-numeric chars
- Added DoS to enterprise identities capture process to improve reliability
- Added functions to simplify hooking menus and hints from plugins
- Added new variables to check support of 802.11n/802.11ac/802.11ax/802.11be standards
- Improved Evil Twin fake APs to add 802.11n/802.11ac/802.11ax if supported by the adapter
- Added support for detecting enterprise networks that report CMAC as their authentication method
- Fixed an issue in some DoS attacks with ESSIDs containing spaces
- Improved BSSID digit randomization to prevent fake AP from using the same MAC address as the original one
- Enhanced captive portal behaviour to avoid detection as suspicious network on Samsung devices
v11.41
Changelog:
- Added a function to simplify hooking language strings from plugins
- Enterprise identities capture feature
- Fixed broken dependency menu validation
- Added a flag to distinguish and validate personal and enterprise networks
- Implemented validations to ensure enterprise attacks are not executed on personal networks and vice versa
- Removed prefix and suffix hint symbols. Now scrambled arabic hint strings are fixed
v11.40
Changelog:
- Code refactor of the heredocs used for the Evil Twin, WEP and WPS attacks
- Standardize xterm parameters and adjust some colors to override the system's default settings
- Fixed bug parsing version number for newer hcxdumptool versions
- Added WEP besside-ng attack
- Added network decloaking feature using two methods
- Changed third available DoS attack (out of DoS attacks menu)
- Fix auto-update check from Docker
v11.31
Changelog:
- Fixed graphics system detection when launched on a headless system using remote X windows
- Fixed minor bug on paths when selecting a directory instead of a file while saving a trophy file
- Improvements on OS/distro detection
- Added feature to know during an Evil Twin captive portal attack, if the client accessed the portal
- Added feature to know during an Evil Twin attack, if the client is still present on the network
- Minor visual improvements on Evil Twin's captive portal
- Improvement on command line while capturing PMKID. Now, faster performance and less default timeout (Thank you to "alexl83")
- Fixed bug on view after a failed asleap attack from offline decryption menu
- Fixed issue on default choice when y/n question is asked while capturing a trap
- Fixed issue to prevent the trap function from being executed multiple times on consecutive Ctrl+C inputs
v11.30
Changelog:
- Added Multi-instance support to launch more than one airgeddon at a time
- Improvements on 5Ghz country code check and 5Ghz band capability detection on adapters
- Fixed bug to avoid set advanced captive portal on second time if is not desired after setting it previously
- Now channel is automatically updated on control window during "DoS pursuit mode" for all Evil Twin attacks
- Fixed error shown while checking if a handshake is wpa2 when wpa3 handshake is captured
v11.22
Changelog:
- Possibility to add manually ESSID name for selected hidden networks
- Improvement on process killing on Evil Twin attacks
- Add WPS version to network selection menu for WPS networks
- Reordered networks on network selection menus (standard and WPS), now networks with the strongest received signal will be placed last to avoid scrolling
- Fixed small bug on Evil Twin captive portal attack for passwords containing more than one space char
- Fixed Docker routing problem
v11.21
Changelog:
- Chinese language translation added (Thank you to "zcbxx")
- Fixed bug parsing cracked PIN on WPS reaver Pixie Dust attack for newer reaver versions
- Fixed error on PMKID capturing due hcxdumptool different params for newer versions using bpf filters
- Fixed error on interfaces and process killing on "DoS pursuit mode"
v11.20
Changelog:
- Improvements and fixes on "DoS pursuit mode"
- Fixed bug on Evil Twin captive portal attack when relative paths used
- Added Consistent Network Device Naming detection check upon interface selection
- Fixed bug on filtered WPA scans when pure WPA3 (SAE) present
- Fixed WPS attacks error message appearing on some Linux distributions
- Fixed bug in graphics system detection for non-systemd systems
- Added optional advanced captive portal including vendor logos