1 2 Ambtion.com 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 Ambtion.com 279 280 281 Advertise Free on Auto-pilot!
Watch the latest videos on YouTube.com
newgoldenjewels: Airba.sh - A POSIX-compliant, Fully Automated WPA PSK Handshake Capture Script Aimed At Penetration Testing

Thursday, August 20, 2020

Airba.sh - A POSIX-compliant, Fully Automated WPA PSK Handshake Capture Script Aimed At Penetration Testing



Airbash is a POSIX-compliant, fully automated WPA PSK handshake capture script aimed at penetration testing. It is compatible with Bash and Android Shell (tested on Kali Linux and Cyanogenmod 10.2) and uses aircrack-ng to scan for clients that are currently connected to access points (AP). Those clients are then deauthenticated in order to capture the handshake when attempting to reconnect to the AP. Verification of a captured handshake is done using aircrack-ng. If one or more handshakes are captured, they are entered into an SQLite3 database, along with the time of capture and current GPS data (if properly configured).
After capture, the database can be tested for vulnerable router models using crackdefault.sh. It will search for entries that match the implemented modules, which currently include algorithms to compute default keys for Speedport 500-700 series, Thomson/SpeedTouch and UPC 7 digits (UPC1234567) routers.

Requirements
WiFi interface in monitor mode aircrack-ng SQLite3 openssl for compilation of modules (optional) wlanhc2hcx from hcxtools
In order to log GPS coordinates of handshakes, configure your coordinate logging software to log to .loc/*.txt (the filename can be chosen as desired). Airbash will always use the output of cat "$path$loc"*.txt 2>/dev/null | awk 'NR==0; END{print}', which equals to reading all .txt files in .loc/ and picking the second line. The reason for this way of implementation is the functionality of GPSLogger, which was used on the development device.

Calculating default keys
After capturing a new handshake, the database can be queried for vulnerable router models. If a module applies, the default keys for this router series are calculated and used as input for aircrack-ng to try and recover the passphrase.

Compiling Modules
The modules for calculating Thomson/SpeedTouch and UPC1234567 (7 random digits) default keys are included in src/
Credits for the code go to the authors Kevin Devine and [peter@haxx.in].
On Linux:
gcc -fomit-frame-pointer -O3 -funroll-all-loops -o modules/st modules/stkeys.c -lcrypto
gcc -O2 -o modules/upckeys modules/upc_keys.c -lcrypto
If on Android, you may need to copy the binaries to /system/xbin/ or to another directory where binary execution is allowed.

Usage
Running install.sh will create the database, prepare the folder structure and create shortlinks to both scripts which can be moved to a directory that is on $PATH to allow execution from any location.
After installation, you may need to manually adjust INTERFACE on line 46 in airba.sh. This will later be determined automatically, but for now the default is set to wlan0, to allow out of the box compatibility with bcmon on Android.
./airba.sh starts the script, automatically scanning and attacking targets that are not found in the database. ./crackdefault.sh attempts to break known default key algorithms.
To view the database contents, run sqlite3 .db.sqlite3 "SELECT * FROM hs" in the main directory.

Update (Linux only ... for now):
Airbash can be updated by executing update.sh. This will clone the master branch into /tmp/ and overwrite the local files.

Output
_n: number of access points found
__c/m: represents client number and maximum number of clients found, respectively
-: access point is blacklisted
x: access point already in database
?: access point out of range (not visible to airodump anymore)

The Database
The database contains a table called hs with seven columns.
id: incrementing counter of table entries
lat and lon: GPS coordinates of the handshake (if available)
bssid: MAC address of the access point
essid: Name identifier
psk: WPA Passphrase, if known
prcsd: Flag that gets set by crackdefault.sh to prevent duplicate calculation of default keys if a custom passphrase was used.
Currently, the SQLite3 database is not password-protected.


Read more

  1. Hacker Security Tools
  2. Install Pentest Tools Ubuntu
  3. Hacking Tools Hardware
  4. Hack Tools Github
  5. Hacking Tools For Windows 7
  6. Hacking App
  7. Pentest Tools Nmap
  8. Hack Tools Mac
  9. Hacker Hardware Tools
  10. Pentest Tools For Ubuntu
  11. Hackers Toolbox
  12. How To Install Pentest Tools In Ubuntu
  13. Pentest Tools Linux
  14. Android Hack Tools Github
  15. Hacker Security Tools
  16. Hacking Tools Software
  17. Best Pentesting Tools 2018
  18. Hack Tools
  19. Hacking Apps
  20. Pentest Tools Url Fuzzer
  21. Hacker Tools List
  22. Hacking Tools For Windows 7
  23. Pentest Box Tools Download
  24. Termux Hacking Tools 2019
  25. Pentest Tools List
  26. Github Hacking Tools
  27. Easy Hack Tools
  28. Android Hack Tools Github
  29. Pentest Tools Nmap
  30. Hackers Toolbox
  31. Hack Rom Tools
  32. Pentest Tools Github
  33. Hacking Tools For Windows Free Download
  34. Pentest Tools Url Fuzzer
  35. How To Install Pentest Tools In Ubuntu
  36. How To Install Pentest Tools In Ubuntu
  37. Pentest Tools Website Vulnerability
  38. Pentest Tools Review
  39. Hacker Tools Apk Download
  40. Hack Tools
  41. Hacking Tools Github
  42. Hack Tools Mac
  43. Hack Tools For Mac
  44. Pentest Tools Framework
  45. Hacking Tools Free Download
  46. Pentest Tools Windows
  47. Black Hat Hacker Tools
  48. Hacker Security Tools
  49. Hacking Tools For Mac
  50. Game Hacking
  51. Pentest Tools Alternative
  52. Pentest Reporting Tools
  53. Pentest Tools For Mac
  54. New Hacker Tools
  55. Hacks And Tools
  56. Hacking Tools For Beginners
  57. Usb Pentest Tools
  58. Hacking Tools For Mac
  59. Hacker Tools Hardware
  60. Pentest Tools Review
  61. Pentest Tools Subdomain
  62. Hacker Tools Hardware
  63. Hacker Search Tools
  64. Hacker Tools Apk Download
  65. Hacking Tools And Software
  66. Pentest Tools Framework
  67. Game Hacking
  68. Hacker Tool Kit
  69. Hacking Tools Windows 10
  70. Tools Used For Hacking
  71. Pentest Tools Windows
  72. Hacking Tools 2020
  73. Pentest Tools Nmap
  74. Hacking Tools For Mac
  75. Hacking Tools For Kali Linux
  76. Hacking Tools For Games
  77. Hacking Tools For Windows Free Download
  78. Pentest Automation Tools
  79. Hack Tools Pc
  80. Hacking Tools And Software
  81. Hack Tools Online
  82. Underground Hacker Sites
  83. Hack Tools For Games
  84. Hacking Tools For Mac
  85. Hacking Tools For Beginners
  86. Game Hacking
  87. Kik Hack Tools
  88. Hacking Tools Kit
  89. Hackers Toolbox
  90. Wifi Hacker Tools For Windows
  91. Hacking Tools Github
  92. Hacking Tools For Games
  93. Bluetooth Hacking Tools Kali
  94. Pentest Tools Open Source
  95. Hacking Tools For Kali Linux
  96. Pentest Tools
  97. Hacker Tools Free Download
  98. Hacker
  99. Hacking Tools For Windows Free Download
  100. Hacking Tools Pc
  101. Beginner Hacker Tools
  102. How To Install Pentest Tools In Ubuntu
  103. Pentest Tools Open Source
  104. What Is Hacking Tools
  105. Hacking Tools 2020
  106. Hacking Tools And Software
  107. Hack Tool Apk
  108. Hacker Tools Apk
  109. Hack Tools For Ubuntu
  110. Hack Tools Online
  111. Hack Website Online Tool
  112. Hacking Tools Pc
  113. Install Pentest Tools Ubuntu
  114. Hack Tools
  115. Hack Tools Github
  116. Pentest Tools Github
  117. Hacker Tools 2020
  118. Pentest Tools For Ubuntu
  119. Hacker Tools For Mac
  120. Nsa Hacker Tools
  121. Underground Hacker Sites
  122. Hak5 Tools
  123. Pentest Tools Online
  124. Hack Tools
  125. Hack Tool Apk No Root
  126. New Hack Tools
  127. Pentest Tools Android
  128. Hack Rom Tools
  129. Hacking Tools For Beginners

No comments: