Humour In Verse

From The warped mind of Emac

Saturday, August 29, 2020

Airba.sh - A POSIX-compliant, Fully Automated WPA PSK Handshake Capture Script Aimed At Penetration Testing



Airbash is a POSIX-compliant, fully automated WPA PSK handshake capture script aimed at penetration testing. It is compatible with Bash and Android Shell (tested on Kali Linux and Cyanogenmod 10.2) and uses aircrack-ng to scan for clients that are currently connected to access points (AP). Those clients are then deauthenticated in order to capture the handshake when attempting to reconnect to the AP. Verification of a captured handshake is done using aircrack-ng. If one or more handshakes are captured, they are entered into an SQLite3 database, along with the time of capture and current GPS data (if properly configured).
After capture, the database can be tested for vulnerable router models using crackdefault.sh. It will search for entries that match the implemented modules, which currently include algorithms to compute default keys for Speedport 500-700 series, Thomson/SpeedTouch and UPC 7 digits (UPC1234567) routers.

Requirements
WiFi interface in monitor mode aircrack-ng SQLite3 openssl for compilation of modules (optional) wlanhc2hcx from hcxtools
In order to log GPS coordinates of handshakes, configure your coordinate logging software to log to .loc/*.txt (the filename can be chosen as desired). Airbash will always use the output of cat "$path$loc"*.txt 2>/dev/null | awk 'NR==0; END{print}', which equals to reading all .txt files in .loc/ and picking the second line. The reason for this way of implementation is the functionality of GPSLogger, which was used on the development device.

Calculating default keys
After capturing a new handshake, the database can be queried for vulnerable router models. If a module applies, the default keys for this router series are calculated and used as input for aircrack-ng to try and recover the passphrase.

Compiling Modules
The modules for calculating Thomson/SpeedTouch and UPC1234567 (7 random digits) default keys are included in src/
Credits for the code go to the authors Kevin Devine and [peter@haxx.in].
On Linux:
gcc -fomit-frame-pointer -O3 -funroll-all-loops -o modules/st modules/stkeys.c -lcrypto
gcc -O2 -o modules/upckeys modules/upc_keys.c -lcrypto
If on Android, you may need to copy the binaries to /system/xbin/ or to another directory where binary execution is allowed.

Usage
Running install.sh will create the database, prepare the folder structure and create shortlinks to both scripts which can be moved to a directory that is on $PATH to allow execution from any location.
After installation, you may need to manually adjust INTERFACE on line 46 in airba.sh. This will later be determined automatically, but for now the default is set to wlan0, to allow out of the box compatibility with bcmon on Android.
./airba.sh starts the script, automatically scanning and attacking targets that are not found in the database. ./crackdefault.sh attempts to break known default key algorithms.
To view the database contents, run sqlite3 .db.sqlite3 "SELECT * FROM hs" in the main directory.

Update (Linux only ... for now):
Airbash can be updated by executing update.sh. This will clone the master branch into /tmp/ and overwrite the local files.

Output
_n: number of access points found
__c/m: represents client number and maximum number of clients found, respectively
-: access point is blacklisted
x: access point already in database
?: access point out of range (not visible to airodump anymore)

The Database
The database contains a table called hs with seven columns.
id: incrementing counter of table entries
lat and lon: GPS coordinates of the handshake (if available)
bssid: MAC address of the access point
essid: Name identifier
psk: WPA Passphrase, if known
prcsd: Flag that gets set by crackdefault.sh to prevent duplicate calculation of default keys if a custom passphrase was used.
Currently, the SQLite3 database is not password-protected.


More articles

  1. Hacker Tools Windows
  2. Hacker Hardware Tools
  3. Hackrf Tools
  4. Hacking Tools 2019
  5. Hacker Tools For Mac
  6. Pentest Tools Download
  7. Computer Hacker
  8. Pentest Tools Open Source
  9. Hacking Tools Windows
  10. Hack Tools Github
  11. Pentest Tools For Windows
  12. Hacking Tools For Windows
  13. Pentest Tools Website
  14. Hacking Tools Github
  15. Github Hacking Tools
  16. Usb Pentest Tools
  17. Hacking Tools Download
  18. Pentest Tools Find Subdomains
  19. Usb Pentest Tools
  20. Hack Tools Download
  21. Hack Tools For Games
  22. Hacker Tools Online
  23. Github Hacking Tools
  24. Hacking Tools For Windows Free Download
  25. Pentest Box Tools Download
  26. Hacker Tools
  27. Pentest Tools
  28. Hacking Tools Software
  29. Nsa Hacker Tools
  30. Pentest Tools Find Subdomains
  31. Hacker Tools Apk
  32. Bluetooth Hacking Tools Kali
  33. Hacker Tools Github
  34. Hackers Toolbox
  35. Hacking Tools For Windows 7
  36. Nsa Hacker Tools
  37. World No 1 Hacker Software
  38. How To Hack
  39. Free Pentest Tools For Windows
  40. Hacks And Tools
  41. Pentest Tools Free
  42. Hack Tools Online
  43. Hacking Tools Free Download
  44. Hacking Tools For Windows Free Download
  45. Hack App
  46. Hacking Tools For Kali Linux
  47. Hacking Tools
  48. Android Hack Tools Github
  49. Hacking Tools Online
  50. Pentest Tools Alternative
  51. Hacking Tools For Mac
  52. Hack Tools Download
  53. Tools Used For Hacking
  54. Pentest Tools Kali Linux
  55. Hacker Tools For Mac
  56. Hacking Tools 2020
  57. Hacking Tools Usb
  58. Hacking Tools Github
  59. Hacking Tools Windows
  60. Hacking Tools
  61. Hacking Tools For Windows 7
  62. Hacking Tools Hardware
  63. Pentest Tools Port Scanner
  64. Hack Tools Online
  65. Blackhat Hacker Tools
  66. Pentest Recon Tools
  67. How To Install Pentest Tools In Ubuntu
  68. Pentest Tools Bluekeep
  69. Github Hacking Tools
  70. Hacker Tools Mac
  71. Beginner Hacker Tools
  72. World No 1 Hacker Software
  73. Hack Tools For Pc
  74. Pentest Reporting Tools
  75. Nsa Hack Tools Download
  76. Blackhat Hacker Tools
  77. Top Pentest Tools
  78. Wifi Hacker Tools For Windows
  79. Hacker Tools Linux
  80. Hacking Tools For Windows
  81. Hacker Hardware Tools
  82. Hacker Hardware Tools
  83. Pentest Tools Windows
  84. Hack Tools For Windows
  85. How To Install Pentest Tools In Ubuntu
  86. Hack Tools Download
  87. New Hack Tools
  88. Best Hacking Tools 2020
  89. Pentest Tools Linux
  90. Hacker Tools Windows
  91. Hacker Tools Free
  92. Hacking Tools For Windows Free Download
  93. Hacking Tools Hardware
  94. Hack App
  95. What Is Hacking Tools
  96. Pentest Tools Open Source
  97. Beginner Hacker Tools
  98. Pentest Reporting Tools
  99. Pentest Tools Nmap
  100. Hacking Tools Download
  101. Hack Tools
  102. Tools Used For Hacking
  103. Top Pentest Tools
  104. Hacking Tools For Windows 7
  105. Pentest Tools Download
  106. Hack Tools For Games
  107. Game Hacking
  108. Hacking Tools Kit
  109. Hack Apps
  110. Hacker Tools Hardware
  111. Hacking Apps
  112. Hack Tools For Mac
  113. Hack Tools For Games

0 Comments:

Post a Comment

<< Home