domingo, 23 de agosto de 2020

Airba.sh - A POSIX-compliant, Fully Automated WPA PSK Handshake Capture Script Aimed At Penetration Testing



Airbash is a POSIX-compliant, fully automated WPA PSK handshake capture script aimed at penetration testing. It is compatible with Bash and Android Shell (tested on Kali Linux and Cyanogenmod 10.2) and uses aircrack-ng to scan for clients that are currently connected to access points (AP). Those clients are then deauthenticated in order to capture the handshake when attempting to reconnect to the AP. Verification of a captured handshake is done using aircrack-ng. If one or more handshakes are captured, they are entered into an SQLite3 database, along with the time of capture and current GPS data (if properly configured).
After capture, the database can be tested for vulnerable router models using crackdefault.sh. It will search for entries that match the implemented modules, which currently include algorithms to compute default keys for Speedport 500-700 series, Thomson/SpeedTouch and UPC 7 digits (UPC1234567) routers.

Requirements
WiFi interface in monitor mode aircrack-ng SQLite3 openssl for compilation of modules (optional) wlanhc2hcx from hcxtools
In order to log GPS coordinates of handshakes, configure your coordinate logging software to log to .loc/*.txt (the filename can be chosen as desired). Airbash will always use the output of cat "$path$loc"*.txt 2>/dev/null | awk 'NR==0; END{print}', which equals to reading all .txt files in .loc/ and picking the second line. The reason for this way of implementation is the functionality of GPSLogger, which was used on the development device.

Calculating default keys
After capturing a new handshake, the database can be queried for vulnerable router models. If a module applies, the default keys for this router series are calculated and used as input for aircrack-ng to try and recover the passphrase.

Compiling Modules
The modules for calculating Thomson/SpeedTouch and UPC1234567 (7 random digits) default keys are included in src/
Credits for the code go to the authors Kevin Devine and [peter@haxx.in].
On Linux:
gcc -fomit-frame-pointer -O3 -funroll-all-loops -o modules/st modules/stkeys.c -lcrypto
gcc -O2 -o modules/upckeys modules/upc_keys.c -lcrypto
If on Android, you may need to copy the binaries to /system/xbin/ or to another directory where binary execution is allowed.

Usage
Running install.sh will create the database, prepare the folder structure and create shortlinks to both scripts which can be moved to a directory that is on $PATH to allow execution from any location.
After installation, you may need to manually adjust INTERFACE on line 46 in airba.sh. This will later be determined automatically, but for now the default is set to wlan0, to allow out of the box compatibility with bcmon on Android.
./airba.sh starts the script, automatically scanning and attacking targets that are not found in the database. ./crackdefault.sh attempts to break known default key algorithms.
To view the database contents, run sqlite3 .db.sqlite3 "SELECT * FROM hs" in the main directory.

Update (Linux only ... for now):
Airbash can be updated by executing update.sh. This will clone the master branch into /tmp/ and overwrite the local files.

Output
_n: number of access points found
__c/m: represents client number and maximum number of clients found, respectively
-: access point is blacklisted
x: access point already in database
?: access point out of range (not visible to airodump anymore)

The Database
The database contains a table called hs with seven columns.
id: incrementing counter of table entries
lat and lon: GPS coordinates of the handshake (if available)
bssid: MAC address of the access point
essid: Name identifier
psk: WPA Passphrase, if known
prcsd: Flag that gets set by crackdefault.sh to prevent duplicate calculation of default keys if a custom passphrase was used.
Currently, the SQLite3 database is not password-protected.


Related news


  1. Pentest Tools For Mac
  2. World No 1 Hacker Software
  3. Android Hack Tools Github
  4. Hacking Tools Download
  5. Pentest Tools Open Source
  6. Hack Tool Apk No Root
  7. Underground Hacker Sites
  8. Hacking Tools Name
  9. Pentest Tools Url Fuzzer
  10. Computer Hacker
  11. Pentest Tools Kali Linux
  12. Hack Tools Pc
  13. Hack Tool Apk No Root
  14. Ethical Hacker Tools
  15. Hacker Tools Free
  16. Hack Tools 2019
  17. Hacking Tools Name
  18. Hacker Tools Mac
  19. Hacker Techniques Tools And Incident Handling
  20. Github Hacking Tools
  21. Ethical Hacker Tools
  22. Install Pentest Tools Ubuntu
  23. Hacking Tools 2019
  24. Hack Tools For Pc
  25. Pentest Tools Nmap
  26. Hacker Tools Free Download
  27. Kik Hack Tools
  28. Hacking Tools Windows 10
  29. Best Hacking Tools 2020
  30. Easy Hack Tools
  31. New Hacker Tools
  32. Pentest Tools Open Source
  33. Pentest Tools Port Scanner
  34. Hack Apps
  35. How To Hack
  36. Hacking Tools Kit
  37. Ethical Hacker Tools
  38. How To Install Pentest Tools In Ubuntu
  39. Hacker Tools Mac
  40. Nsa Hack Tools
  41. Hack Apps
  42. How To Install Pentest Tools In Ubuntu
  43. Github Hacking Tools
  44. Pentest Tools Github
  45. Pentest Box Tools Download
  46. Pentest Tools Find Subdomains
  47. Hacking Tools For Beginners
  48. Beginner Hacker Tools
  49. Github Hacking Tools
  50. Hacking Tools Free Download
  51. Hacker Tools Linux
  52. Hacker Tools For Windows
  53. Best Hacking Tools 2019
  54. Hack Tools Mac
  55. Usb Pentest Tools
  56. Hacker Tools
  57. Hacker Tools Github
  58. Tools 4 Hack
  59. Pentest Tools Open Source
  60. Pentest Box Tools Download
  61. Hacking Tools And Software
  62. Pentest Tools Free
  63. Hacker Tools For Ios
  64. Nsa Hacker Tools
  65. Hacker Tools Free
  66. Tools 4 Hack
  67. Tools 4 Hack
  68. What Are Hacking Tools
  69. Hacker Tool Kit
  70. Pentest Box Tools Download
  71. Pentest Tools Online
  72. Pentest Tools Find Subdomains
  73. Hacker Tools Github
  74. Game Hacking
  75. Hacks And Tools
  76. Hacking Tools Windows 10
  77. Hacking Tools For Windows 7
  78. Hacker Security Tools
  79. Hacking Tools For Windows 7
  80. Pentest Tools For Ubuntu
  81. Pentest Tools Bluekeep
  82. Hacker Tools Software
  83. Wifi Hacker Tools For Windows
  84. Hack And Tools
  85. Kik Hack Tools
  86. Hack Tools Download
  87. Easy Hack Tools
  88. Hacker
  89. Pentest Tools Download
  90. Hacker Tools Free
  91. Hacker Tools Github
  92. Hack Tool Apk
  93. Pentest Tools For Android
  94. Hacking Tools Name
  95. Hacking Tools For Mac
  96. Hacking Tools Hardware
  97. Hacking Tools Hardware
  98. World No 1 Hacker Software
  99. Pentest Reporting Tools
  100. Hacker Tools For Ios
  101. Android Hack Tools Github
  102. Tools For Hacker
  103. Hacker Tools For Mac
  104. Pentest Tools Nmap
  105. Hack Tools For Ubuntu
  106. Hacking Tools Download
  107. Hacking Tools Download
  108. Pentest Box Tools Download
  109. Hacker Tools Free
  110. Pentest Tools Subdomain
  111. Nsa Hack Tools
  112. Pentest Tools Website Vulnerability
  113. Hacker Tools Linux
  114. Hacker Tools Windows
  115. Pentest Tools List
  116. Pentest Tools Github
  117. Hack Tools
  118. Hack Tools Github
  119. Pentest Tools For Android
  120. Hacker Tools Apk Download
  121. Install Pentest Tools Ubuntu
  122. Pentest Tools Subdomain
  123. Hack Tool Apk
  124. Pentest Tools Online
  125. Hack And Tools
  126. Hacking Tools For Windows 7
  127. Free Pentest Tools For Windows
  128. Pentest Tools For Mac
  129. Pentest Tools Bluekeep
  130. Nsa Hack Tools Download
  131. Hack Tools Pc
  132. What Are Hacking Tools
  133. Hacking Tools Windows 10
  134. How To Make Hacking Tools
  135. Hacking Tools For Windows 7
  136. Hacker Tools For Mac
  137. Hacker Tools Mac
  138. Hacker Techniques Tools And Incident Handling
  139. Hack Apps
  140. Hacker Tools Apk Download
  141. Hack App
  142. How To Hack
  143. Hacking Tools For Windows
  144. Hacking Tools For Kali Linux
  145. Pentest Tools For Mac
  146. Hacker Tools Free Download

Nenhum comentário:

Postar um comentário