Airba.sh - A POSIX-compliant, Fully Automated WPA PSK Handshake Capture Script Aimed At Penetration Testing



Airbash is a POSIX-compliant, fully automated WPA PSK handshake capture script aimed at penetration testing. It is compatible with Bash and Android Shell (tested on Kali Linux and Cyanogenmod 10.2) and uses aircrack-ng to scan for clients that are currently connected to access points (AP). Those clients are then deauthenticated in order to capture the handshake when attempting to reconnect to the AP. Verification of a captured handshake is done using aircrack-ng. If one or more handshakes are captured, they are entered into an SQLite3 database, along with the time of capture and current GPS data (if properly configured).
After capture, the database can be tested for vulnerable router models using crackdefault.sh. It will search for entries that match the implemented modules, which currently include algorithms to compute default keys for Speedport 500-700 series, Thomson/SpeedTouch and UPC 7 digits (UPC1234567) routers.

Requirements
WiFi interface in monitor mode aircrack-ng SQLite3 openssl for compilation of modules (optional) wlanhc2hcx from hcxtools
In order to log GPS coordinates of handshakes, configure your coordinate logging software to log to .loc/*.txt (the filename can be chosen as desired). Airbash will always use the output of cat "$path$loc"*.txt 2>/dev/null | awk 'NR==0; END{print}', which equals to reading all .txt files in .loc/ and picking the second line. The reason for this way of implementation is the functionality of GPSLogger, which was used on the development device.

Calculating default keys
After capturing a new handshake, the database can be queried for vulnerable router models. If a module applies, the default keys for this router series are calculated and used as input for aircrack-ng to try and recover the passphrase.

Compiling Modules
The modules for calculating Thomson/SpeedTouch and UPC1234567 (7 random digits) default keys are included in src/
Credits for the code go to the authors Kevin Devine and [peter@haxx.in].
On Linux:
gcc -fomit-frame-pointer -O3 -funroll-all-loops -o modules/st modules/stkeys.c -lcrypto
gcc -O2 -o modules/upckeys modules/upc_keys.c -lcrypto
If on Android, you may need to copy the binaries to /system/xbin/ or to another directory where binary execution is allowed.

Usage
Running install.sh will create the database, prepare the folder structure and create shortlinks to both scripts which can be moved to a directory that is on $PATH to allow execution from any location.
After installation, you may need to manually adjust INTERFACE on line 46 in airba.sh. This will later be determined automatically, but for now the default is set to wlan0, to allow out of the box compatibility with bcmon on Android.
./airba.sh starts the script, automatically scanning and attacking targets that are not found in the database. ./crackdefault.sh attempts to break known default key algorithms.
To view the database contents, run sqlite3 .db.sqlite3 "SELECT * FROM hs" in the main directory.

Update (Linux only ... for now):
Airbash can be updated by executing update.sh. This will clone the master branch into /tmp/ and overwrite the local files.

Output
_n: number of access points found
__c/m: represents client number and maximum number of clients found, respectively
-: access point is blacklisted
x: access point already in database
?: access point out of range (not visible to airodump anymore)

The Database
The database contains a table called hs with seven columns.
id: incrementing counter of table entries
lat and lon: GPS coordinates of the handshake (if available)
bssid: MAC address of the access point
essid: Name identifier
psk: WPA Passphrase, if known
prcsd: Flag that gets set by crackdefault.sh to prevent duplicate calculation of default keys if a custom passphrase was used.
Currently, the SQLite3 database is not password-protected.


Continue reading


  1. Hacker Techniques Tools And Incident Handling
  2. Pentest Tools Review
  3. Pentest Tools Linux
  4. Pentest Tools Online
  5. Hak5 Tools
  6. Pentest Tools Subdomain
  7. Hacker Tools List
  8. Pentest Tools Website
  9. Pentest Tools For Android
  10. Hacker Tools Free
  11. Pentest Tools Alternative
  12. Hacker Tools Windows
  13. Hacking Tools Online
  14. Pentest Tools Bluekeep
  15. Pentest Tools Website Vulnerability
  16. Termux Hacking Tools 2019
  17. Tools Used For Hacking
  18. How To Hack
  19. Hack Rom Tools
  20. Hacking Tools 2020
  21. Best Pentesting Tools 2018
  22. Pentest Tools Github
  23. Hack Tools Online
  24. Blackhat Hacker Tools
  25. Hacking Tools Windows 10
  26. Hak5 Tools
  27. Hack Tools For Ubuntu
  28. Hackrf Tools
  29. Hacker Tools For Ios
  30. Hacking Tools For Windows Free Download
  31. Hacker Tools Apk
  32. Hacking Tools Hardware
  33. Pentest Tools Website
  34. Hacking Tools Windows 10
  35. World No 1 Hacker Software
  36. Pentest Tools For Windows
  37. Hack Tools For Windows
  38. World No 1 Hacker Software
  39. Hacking Tools 2020
  40. Easy Hack Tools
  41. Pentest Tools Linux
  42. New Hacker Tools
  43. Hacking Tools For Mac
  44. Pentest Reporting Tools
  45. Hack Tools
  46. Pentest Tools Bluekeep
  47. Hacker Tools Apk Download
  48. Hacking Tools For Kali Linux
  49. Hacker Tools Windows
  50. Hak5 Tools
  51. Hack Website Online Tool
  52. Hack Tools For Mac
  53. Hacker Tools Mac
  54. Hacker Tools Mac
  55. Hacker Tool Kit
  56. Hacking Tools Name
  57. Hacking Tools Pc
  58. Hack Tools Pc
  59. Hacker Tools Apk
  60. How To Hack
  61. Hacker Tools For Mac
  62. Pentest Tools For Android
  63. Hacking Tools For Windows 7
  64. Install Pentest Tools Ubuntu
  65. Hacker Tools Github
  66. Hackers Toolbox
  67. Hacker Tools For Mac
  68. Hacking Tools For Games
  69. Growth Hacker Tools
  70. Hack Tools For Mac
  71. Hacker Tools Mac
  72. Hacking Tools 2020
  73. Hack Tools Mac
  74. Hacker Tool Kit
  75. Hacking Tools And Software
  76. Hacker Tools For Mac
  77. Hacker Tools Apk
  78. Pentest Tools Github
  79. Underground Hacker Sites
  80. Pentest Tools For Android
  81. Ethical Hacker Tools
  82. Hacker Tools 2019
  83. Hackers Toolbox
  84. Hacking Tools Software
  85. Tools 4 Hack
  86. Hacking Tools Free Download
  87. How To Hack
  88. Best Hacking Tools 2020
  89. Pentest Tools Website Vulnerability
  90. Hacker Tools Linux
  91. Pentest Tools Url Fuzzer
  92. Pentest Tools Free
  93. Pentest Recon Tools
  94. Pentest Tools Apk
  95. Physical Pentest Tools
  96. Hacker Tools Hardware
  97. Hack Tools 2019
  98. Hacking Tools 2019
  99. Hacking Tools For Games
  100. Hacker Tools For Ios
  101. Hacking Tools Windows
  102. Best Hacking Tools 2020
  103. Hacker Tools Software
  104. Hack Tool Apk No Root
  105. Hacking Tools
  106. Pentest Tools Free
  107. Pentest Tools Download
  108. How To Hack

Tidak ada komentar:

Posting Komentar