Wifipumpkin3 is a powerful Python-based framework that enables security researchers to create rogue WiFi access points for man-in-the-middle and phishing attacks.
Powerful framework for rogue access point attack.
This tool is primarily used by security researchers, red teamers, and penetration testers to simulate rogue access point attacks and conduct man-in-the-middle attacks on wireless networks. It helps in assessing network security by intercepting, inspecting, and modifying network traffic, as well as harvesting credentials through captive portals and phishing techniques.
Wifipumpkin3 requires hostapd installed and is only supported on Linux systems; Windows is not supported. Users should have appropriate permissions and legal authorization before performing any network attacks. The tool supports advanced phishing attacks including MFA phishing via captive portals and QR code phishing, so caution and ethical use are strongly advised.
Ensure Python 3.8 or later is installed
Install hostapd on the host system (required by default)
Use a recent Linux distribution (Ubuntu 22.04 LTS recommended)
Clone the repository or download the tool from the official site
Follow the official installation guide at https://wifipumpkin3.github.io/docs/getting-started#installation
wp3
Launch the wifipumpkin3 framework CLI to start configuring rogue access point attacks.
wp3 --help
Display help information and available commands within the framework.