Update PwnSTAR V-0.72 – Pwn_SofT_Ap_scRipt.

Changes V-0.72 : Have added in the new MSXML exploit against Internet Explorer. This will exploit Windows 7. The payload is the default metasploit so is likely to be picked up by AV.

New features Sinces V-0.7:
  • custom dnsspoofing in the basic menu (targeted spoofing for a particular site)
  • Eterm cursor colour changed (more visible on light background)

General Features : 

  •     manage interfaces and MACspoofing
  •     set up sniffing
  •     serve up phishing or malicious web pages
  •     launch karmetasploit
  •     grab WPA handshakes
  •     de-auth clients
  •     manage IPtables
Sample screenshoot

backup index to backup directory (no longer overwrites previous backups)
sleeps reduced – runs faster

Instructions for use:
download and untar
copy the hotspot directory into /var/www
set permissions;
hotspot directory:- group www-data, create and delete files
formdata.txt:- group www-data, rw
process-form-data.php:- make executable
leave index.html where it is; PwnSTAR will move it into position


1. For the honey pot we don’t give internet access – set your wlan0 as the AP interface. This is how it goes:


wlan0 00:c0:XXXXXX …( just hitted enter here).
2 You shouldn’t need to create any additional directories once you have moved “hotspot” into /var/www. Your directory setup should look like this:

3. And then running the script (red is your entries):

Try again with it set up like this.

Download :
PwnSTAR_0.72 (48.1 KB)
portal_pdf.tgz (300 KB) New webpage: portal_pdf.tgz (contains evil-pdfs, index php, a “virgin” pdf to add your own payload, and a stand-alone payload that will work with the script)
Find other version |
Read more in here : http://code.google.com/p/pwn-star/

Our Post Before :