Airscript Ng Save Abandoned

A python script to simplify the process of auditing wireless networks.

Project README

Airscript-ng Build Version Bash_Version Python_Version Dependencies

Airscript-ng is a modular, object-oriented program written in python3 to simplify the process of performing basic manipulation on a wireless network. The goal here is not to compete with existing tools or scripts, but to provide as much functionality and simplicity to the end user as possible, so that someone with no previous experience can use a WiFi-cracking tool such as aircrack-ng or reaver. As long as you know some of the general theory behind cracking WPA2 or WPS, you will be able to use this script with ease.

In addition to allowing a user to capture a handshake, this script can host a basic Evil-Twin wireless AP and crack a WPA2 handshake using your GPU with Hashcat. see https://hashcat.net/hashcat/.

GitHub forks GitHub stars GitHub watchers

Prerequisites

  • Some familiarity with the Linux command line (e.g. filesystem navigation)
  • General overview of how WiFi hacking works.
  • The APT package manager (Must be able to install packages and have appropriate repository lists)
  • The bash shell (version 4.2+ is preferred)
  • A stable internet connection (To fetch dependencies and updates)
  • A Debian based distro. (Tested on: Kali Linux 2018.2/Ubuntu 16.04.04 LTS)
  • Root access. Otherwise the program will not work.
  • A WiFi-card/chipset that is capable of supporting monitor mode. (see: https://www.aircrack-ng.org/doku.php?id=compatible_cards)
  • Wireless interface names must start with "wl". E.g. "wlan1" or "wlxxxx" (Custom interface names are not supported)
  • Drivers capable of running in promiscuous monitor mode/packet injection mode.
  • A x86_64 or AMD64 (64 bit) processor. (32bit will work to an extent)
  • 300-500MiB free space (For caching and storing wordlists)
  • (Optional) A hashcat supported GPU, with appropriate drivers installed.
  • (Optional) A second WiFi card, needed to create a Evil-Twin/Fake-AP. This doesn't need monitor mode or packet injection.

Usage

$ sudo chmod +x ./setup.sh
$ sudo ./setup.sh
$ sudo ./airscript-ng.py

The rest is self explainatory once run, choose your attack option from the menu and you are good to go! Anyone can use this script to pentest a wireless network, it really is that simple to use. Try it out!

Additonal note: Airscript-ng is in active development. If you're going to fork this project, please ensure to keep checking back, as your fork may be outdated. Any contributions are absolutely welcome, please create a pull request.

How do you update this script? just run it and type 8 in the menu. Want to update manually? Simply git stash the changes and git pull the new additions.

Upcoming

  • Make a basic python script
  • Add support for reaver/pixiedust [Added 11/06/17]
  • Add function to automatically download dependencies [Added 17/06/17]
  • Add support for captive portal/Evil-twin AP [Added 24/08/2017]
  • Add function to crack .cap files using GPU/CPU [Added 24/08/2017]
  • Improve menu layout [Improved 30/9/2017]
  • Add function to install Hashcat/Hashcat-utils [Added 30/9/2017]
  • Add Hostapd as AP hosting method [Added 27/10/2017]
  • Improve network selection process [Added 16/11/2017]
  • Make code object oriented [Rewritten 20/06/2018]
  • Add support for MDK4 (Beacon-Flood and Deauth-DOS) [Added 07/07/2018]
  • Add support for Cowpatty/Genpmk [Coming soon]
  • Add FHS compliancy and lint code to conform with PEP8
  • Improve startup times, performance and code efficiency

Work on this project is expected to resume soon!

  • I plan to write three different interfaces for this, a GUI, a webapp and the script version as it stands now.
  • The expected timeframe to resume development is by Early 2021.

Screenshots

Title Menu Aircrack-ng Reaver Fake AP MITM Crack Handshake Manual Control Beacon Flood

Credits and inspirations

Thanks to Joshua. for extensively testing it on his machine! Thanks to TomHulmeUK for helping with testing! Project inspired by Airgeddon and Fluxion

WPA3 ANNOUNCED!

Open Source Agenda is not affiliated with "Airscript Ng" Project. README Source: Sh3llcod3/Airscript-ng

Open Source Agenda Badge

Open Source Agenda Rating