Airbash is a POSIX-compliant, fully automated WPA PSK handshake capture script aimed at penetration testing. It is compatible with Bash and Android Shell (tested on Kali Linux and Cyanogenmod 10.2) and uses aircrack-ng to scan for clients that are currently connected to access points (AP). Those clients are then deauthenticated in order to capture the handshake when attempting to reconnect to the AP. Verification of a captured handshake is done using aircrack-ng. If one or more handshakes are captured, they are entered into an SQLite3 database, along with the time of capture and current GPS data (if properly configured).
After capture, the database can be tested for vulnerable router models using
crackdefault.sh
. It will search for entries that match the implemented modules, which currently include algorithms to compute default keys for Speedport 500-700 series, Thomson/SpeedTouch and UPC 7 digits (UPC1234567) routers.Requirements
WiFi interface in monitor mode aircrack-ng SQLite3 openssl for compilation of modules (optional) wlanhc2hcx from hcxtools
In order to log GPS coordinates of handshakes, configure your coordinate logging software to log to .loc/*.txt (the filename can be chosen as desired). Airbash will always use the output of
cat "$path$loc"*.txt 2>/dev/null | awk 'NR==0; END{print}'
, which equals to reading all .txt files in .loc/ and picking the second line. The reason for this way of implementation is the functionality of GPSLogger, which was used on the development device.Calculating default keys
After capturing a new handshake, the database can be queried for vulnerable router models. If a module applies, the default keys for this router series are calculated and used as input for aircrack-ng to try and recover the passphrase.
Compiling Modules
The modules for calculating Thomson/SpeedTouch and UPC1234567 (7 random digits) default keys are included in
src/
Credits for the code go to the authors Kevin Devine and [peter@haxx.in].
On Linux:
gcc -fomit-frame-pointer -O3 -funroll-all-loops -o modules/st modules/stkeys.c -lcrypto
gcc -O2 -o modules/upckeys modules/upc_keys.c -lcrypto
Usage
Running
install.sh
will create the database, prepare the folder structure and create shortlinks to both scripts which can be moved to a directory that is on $PATH to allow execution from any location.After installation, you may need to manually adjust
INTERFACE
on line 46 in airba.sh
. This will later be determined automatically, but for now the default is set to wlan0
, to allow out of the box compatibility with bcmon on Android../airba.sh
starts the script, automatically scanning and attacking targets that are not found in the database. ./crackdefault.sh
attempts to break known default key algorithms.To view the database contents, run
sqlite3 .db.sqlite3 "SELECT * FROM hs"
in the main directory.Update (Linux only ... for now):
Airbash can be updated by executing
update.sh
. This will clone the master branch into /tmp/ and overwrite the local files.Output
_n
: number of access points found__c/m
: represents client number and maximum number of clients found, respectively-
: access point is blacklistedx
: access point already in database?
: access point out of range (not visible to airodump anymore)The Database
The database contains a table called
hs
with seven columns.id
: incrementing counter of table entrieslat
and lon
: GPS coordinates of the handshake (if available)bssid
: MAC address of the access pointessid
: Name identifierpsk
: WPA Passphrase, if knownprcsd
: Flag that gets set by crackdefault.sh to prevent duplicate calculation of default keys if a custom passphrase was used.Currently, the SQLite3 database is not password-protected.
More info
- Hacker Hardware Tools
- Termux Hacking Tools 2019
- Hacking Tools
- Hackrf Tools
- Hacker Tools Free Download
- Hacking Tools Download
- Hacking Tools Online
- Hack Tools 2019
- Hack And Tools
- Hacking Tools For Windows 7
- Game Hacking
- Pentest Recon Tools
- Hacking Tools For Windows
- Hack Tools
- Nsa Hack Tools
- Hacking Tools For Kali Linux
- Best Hacking Tools 2020
- Hack Tools For Mac
- Hack Tools 2019
- Pentest Tools For Mac
- Hacking Tools For Mac
- Hacking App
- Wifi Hacker Tools For Windows
- Free Pentest Tools For Windows
- Hacking Tools For Pc
- Top Pentest Tools
- Hacker Tool Kit
- Computer Hacker
- Hacker Tools For Ios
- Hack Tools Pc
- Hacking Tools 2020
- Beginner Hacker Tools
- Pentest Tools Nmap
- Pentest Tools
- Hacking Tools And Software
- Hack Tools For Games
- Hack Rom Tools
- Pentest Tools Port Scanner
- Hacker Tools Free
- Underground Hacker Sites
- Underground Hacker Sites
- Hack Tools
- Pentest Tools Framework
- Bluetooth Hacking Tools Kali
- Hacker Tool Kit
- Hack Tools Github
- Hack Tools Download
- Pentest Box Tools Download
- Hacker Tools Online
- Pentest Tools Tcp Port Scanner
- Kik Hack Tools
- Hacking Tools Online
- Computer Hacker
- What Are Hacking Tools
- Hacking Tools Windows
- Hack Tools For Mac
- Hacker Tools For Ios
- Hack Website Online Tool
- Hacking Tools For Kali Linux
- Android Hack Tools Github
- Hacking Tools
- Hacking Tools
- Pentest Tools For Ubuntu
- Pentest Tools List
- Pentest Tools Windows
- Computer Hacker
- Hack Tools Pc
- Hacking Tools Download
- Pentest Tools Online
- Nsa Hack Tools
- Pentest Tools Framework
- Hack Tools
- New Hack Tools
- Black Hat Hacker Tools
- New Hacker Tools
- Pentest Tools List
- Hacker Tools Free
- Nsa Hack Tools Download
- Hacking Tools Mac
- Pentest Tools Review
- Pentest Recon Tools
- Wifi Hacker Tools For Windows
- Hacking App
- Hacking Tools For Beginners
- Hack Tools For Mac
- Hacker
- Pentest Automation Tools
- Github Hacking Tools
- Hacker Tools Apk Download
- Hacking Tools 2020
- Pentest Tools Free
- Hacker Tools List
- Pentest Automation Tools
- How To Make Hacking Tools
- Underground Hacker Sites
- Hacking Tools 2020
- Hacker Techniques Tools And Incident Handling
- Hacking Tools For Pc
- Hacking App
- Pentest Tools Alternative
- Pentest Tools Review
- Hacking Tools For Games
- Kik Hack Tools
- New Hack Tools
- Kik Hack Tools
- Hack Tools For Mac
- Hacking Tools Pc
- Free Pentest Tools For Windows
- Hack App
- Beginner Hacker Tools
- Hacker Tools
- Hacker Techniques Tools And Incident Handling
- Hack Tools
- Hacking Tools Github
- Hacking Tools Online
- Black Hat Hacker Tools
- Tools 4 Hack
- Hack Website Online Tool
- Hack Tools For Pc
- Pentest Tools Nmap
- Hacker Security Tools
- Pentest Tools Url Fuzzer
- Hacker Tools List
- Pentest Tools Online
- Hack Tools Mac
- Hacking Tools And Software
- Hacker Tools Hardware
- Hacker Security Tools
- Pentest Tools For Mac
- Hacker Search Tools
- Hacking Tools Software
- Pentest Tools Bluekeep
- Pentest Tools Website
- Hacker
- Hacker Tools Github
- Hacking Tools Online
- Wifi Hacker Tools For Windows
- Hack Tools For Pc
- Computer Hacker
- Pentest Tools Review
- Best Hacking Tools 2019
- Hacking Tools 2019
- Hacker Tools Mac
- Hacking Tools For Windows 7
- Hacker Tools Mac
- Hackers Toolbox
- Pentest Box Tools Download
- Hacking Tools Free Download
- Hacking Tools Free Download
- Hack Tools
- Top Pentest Tools
- Pentest Tools Port Scanner
- Pentest Tools Open Source
- Nsa Hacker Tools
- Hacker Tools For Windows
- Hacking Tools
- Hacking Tools For Windows
- Termux Hacking Tools 2019
- Hacker Tools Hardware
- Tools 4 Hack
- Hack Rom Tools
- Hacking Tools Mac
- World No 1 Hacker Software
- Hacking Tools For Windows
- Hacking Tools For Kali Linux
- Pentest Tools Free
- Hacker Search Tools
- Pentest Tools For Ubuntu
- Tools 4 Hack
- Nsa Hacker Tools
- How To Install Pentest Tools In Ubuntu
- Pentest Tools Bluekeep
- Pentest Tools For Android
- Pentest Tools For Windows
- Hacker Search Tools
- Hacking Tools For Windows Free Download
- Top Pentest Tools
No hay comentarios:
Publicar un comentario