WibrFake ๐๐
Advanced Wi-Fi Security Assessment Framework
Professional tool for wireless network penetration testing and vulnerability analysis
๐ Table of Contents
- Key Features
- Ethical Considerations
- Prerequisites
- Installation
- Basic Usage
- Attack Modules
- Captive Portal Templates
- Contributing
- License
โจ Key Features
Core Capabilities
- Rogue Access Point Deployment
- Custom SSID configuration
- Multiple channel support
- Traffic interception & analysis
- Advanced MAC Spoofing
- OUI validation system
- Random/preset MAC generation
- MAC persistence management
- Session Orchestration
- Parallel attack sessions
- State preservation
- Configuration versioning
Enterprise-Grade Modules
Module | Description |
---|---|
Evil Twin | AP cloning with beacon flooding |
Captive Portal | Credential harvesting framework |
WKdump Automation | YAML-based attack configurations |
โ Ethical Considerations
This tool must only be used for:
- Authorized security audits
- Educational purposes
- Ethical penetration testing
By using WibrFake, you agree to:
- Comply with all applicable laws
- Obtain proper authorization
- Respect network privacy
- Never engage in malicious activities
๐ง Prerequisites
Mandatory Requirements
sudo apt-get install -y \
hostapd \
libpcap-dev \
ruby \
ruby-full \
Recommended Specifications
- Linux
- Wireless adapter supporting ap mode
- Dual-band Wi-Fi card (2.4GHz/5GHz)
- Minimum 2GB RAM
๐ Installation
Standard Setup
git clone https://github.com/BreakerTWS/WibrFake.git
cd WibrFake
sudo bundle install
sudo ruby bin/wibrfake --help
RubyGem (Recommended)
sudo gem install wibrfake-brk
sudo wibrfake --help
Usage
This will launch a web server displaying the complete usage documentation for the wibrfake program:
sudo wibrfake --usage
๐น Basic Usage
Initialization
sudo wibrfake --mode cli --iface wlan0
MAC Management
# Show current configuration
mac status
#OUIs list
mac list
mac list 10..20
# Generate random MAC with valid OUI
mac ramset b2:fa:91
# Set specific MAC address
mac set 00:11:22:33:44:55
โก Attack Modules
Rogue AP Deployment
set ssid Wifi_Free
apfake on
Evil Twin Attack
Continue...
๐ Captive Portal Templates
WibrFake supports enterprise-grade phishing templates:
Template | Description | Authentication Methods |
---|---|---|
Basic Login | Generic credential form | Username/Password |
Nauta Etecsa | Cuban ISP portal clone | Account Nauta |
Nauta Hogar | Residential ISP variant | Account Nauta |
Social media clone | OAuth/2FA | |
Social media clone | Email/Phone | |
Social media clone | Social credentials |
๐ค Contributing
We welcome responsible disclosures and ethical contributions. Please review our:
๐ License
Distributed under MIT License. See LICENSE for full details.
๐ Security Recommendations
For optimal security during audits:
- Use dedicated hardware
- Enable VPN tunneling
- Regularly rotate MAC addresses
- Limit attack surface
- Destroy captured data post-audit
Warning
Unauthorized use of this software violates international laws.
Developers assume no liability for misuse.