v1s1t0r1sh3r3 / airgeddon Goto Github PK
View Code? Open in Web Editor NEWThis is a multi-use bash script for Linux systems to audit wireless networks.
License: GNU General Public License v3.0
This is a multi-use bash script for Linux systems to audit wireless networks.
License: GNU General Public License v3.0
last 7.23
Kali Linux 2018.1, mac air 2012
BCM4322
after install last version of kali next problem:
(broadcom-sta)[https://unix.stackexchange.com/questions/420879/how-to-install-the-proprietary-driver-wl-after-removing-the-broadcom-sta-packa]
installig broadcom-sta-dkms_6.30.223.271-7_all.deb
turn monitor mode and ill see:
iwconfig
wlan0 IEEE 802.11
Mode:Managed
Bit Rate=162 Mb/s Tx-Power=200 dBm
Retry short limit:7 RTS thr:off Fragment thr:off
Encryption key:off
Power Management:off
Link Quality=40/70 Signal level=-70 dBm
Rx invalid nwid:0 Rx invalid crypt:0 Rx invalid frag:0
Tx excessive retries:0 Invalid misc:0 Missed beacon:0
prism0 no wireless extensions.
``
prism0 working with airodump-ng prism0 but airgeddon talk about find target: prism0 not monitor mode because iwconfig say `prism0 no wireless extensions.` but work correctly
8.0
Kali 2018.1
Intel Corporation Centrino Ultimate-N 6300
Run the script I get an error for DHCPD, Kali is using udhcpd instead of dhcpd. How do I get airgeddon to use udhcpd since I want to be able to use the feature that require DHCPD.
8.01
Linux Kali Rolling 2018
RTL8723BE
Today. script was checking for update and found one. when he downloaded it. something went wrong like he can't find language string command not found
airgeddon script v6.1
Gentoo
Alfa
Instead of do a new scan for new targets, try to add the option of choose a new target from the previous scan
Thanks for your time, have a nice day (n__n)
Hi. I need some help. I have some code to get reaver version (you can check it right now on WPS branch):
reaver_version=$(reaver -h 2> /dev/null | egrep "^Reaver v[0-9]" | awk '{print $2}')
reaver_version=${reaver_version:1:${#reaver_version}}
reaver hasn't a parameter to show version... show it must be captured from the help output.
At first sight, this is working... but sadly, not on all Linux. It works on Kali Linux for example... but on other Linux like Wifislax is not working. egrep has different behavior, not sure why... I saw egrep is v2.26 on Kali and 2.25 on Wifislax... anybody with other idea about how to get reaver version in a standard fully working compatible with all Linux way? Thank you.
Airgeddon version: 8.01
Parrot OS
Hello,
Im using the evil twin attack method in airgeddon. But I have one problem, I live in Sweden and there are no Swedish translations avaible for the fishing page. Thats why im wondering if its possible to add a customised fishing page layout. How do you do that? Would it also then be possible to implent a fishing page specialized for the specific router. For example it may say like "TP LINK 3104" or something on the page.
I hope that I didnt violate any rule when I didnt write in the format presentated. When I posted the issue you couldnt see anything, so I just deleted everything.
Hi there!
I tried your script and i am stuck just after launching it.
I have a single wifi interface, i tried your script letting it in manged mode and putting it in monitor mode.
`*********************************_Welcome_**********************************
Welcome to airgeddon script v2.02
This script is only for educational purposes. Be good boyz&girlz
Supported distros for this script: Kali and Wifislax
Detecting distro...
Kali Linux distro detected. Script can continue...
Press [Enter] key to continue...
(...)
_Interface selection_*
Select an interface to work with :
wlan0
Invalid interface was chosen
Press [Enter] key to continue...
(...)
_Interface selection_*
Select an interface to work with :
wlan0mon
Invalid interface was chosen
Press [Enter] key to continue...
(...)
`
I tried to enter wlan0 or wlan0mon but did not get anything
and i can see some error in coding, like you put somewhere "airmon-ng stop mon0"
mode monitor interface should be now wlanXmon and even if you use an outdated distribution that still have old airmon-ng it doesn't have to be mon0... if your interface is wlan1 it will be mon1 (and now it should be wlan1mon) ..
take care
v6.12
Linux k4li 4.9.0-kali3-686-pae #1 SMP Debian 4.9.18-1kali1 (2017-04-04) i686 GNU/Linux
rt2800usb
Ralink Technology, Corp. RT2870/RT3070
*EvilTwin attack doesn't work with two interfaces in the same time!
I tried to use one interface as in monitor mode and anothre to provide internet but the one that provide internet
never works!
I think it doesnt because after I put all parameters of the attack and I press ENTER to start it the NetworkManager process gets killed .. thats why it doesn't provide internet!
Thanks in advance!
7.2
Kali Rolling
Bash version (4.4.12(1)-release)
Realtek RTL8812AU
I have installed the realtek-rtl88xxau-dkms
driver.
When i run airgeddon.sh, it displays the following on the Interface selection menu:
Select an interface to work with :
---------
1. eth0 // Chipset: Intel Corporation 82545EM
2. wlan0 // Chipset:
It can't recognize the wlan0
name and fails on next step
---------
2. Put interface in monitor mode
---------
Step 2 will fail, I need to manually run iwconfig wlan0 mode monitor
, in order to proceed.
**************************** Exploring for targets *****************************
Exploring for targets option chosen (monitor mode needed)
Selected interface wlan1mon is in monitor mode. Exploration can be performed
When started, press [Ctrl+C] to stop...
Press [Enter] key to continue...
./airgeddon.sh: line 7117: /tmp/nws-01.csv: No such file or directory
No networks found
===============================================
System setting
Detecting system...
Raspbian Linux
Let's check if you have installed what script needs
Press [Enter] key to continue...
Essential tools: checking...
ifconfig .... Ok
iwconfig .... Ok
iw .... Ok
awk .... Ok
airmon-ng .... Ok
airodump-ng .... Ok
aircrack-ng .... Ok
xterm .... Ok
Optional tools: checking...
iptables .... Ok
wpaclean .... Ok
packetforge-ng .... Ok
bully .... Ok
sslstrip .... Ok
aireplay-ng .... Ok
beef .... Error (Possible package name : beef-xss / beef-project)
unbuffer .... Ok
dhcpd .... Ok
lighttpd .... Ok
wash .... Ok
crunch .... Ok
etterlog .... Ok
dnsspoof .... Ok
ettercap .... Ok
hashcat .... Error (Possible package name : hashcat)
reaver .... Ok
mdk3 .... Ok
bettercap .... Error (Possible package name : bettercap)
pixiewps .... Ok
hostapd .... Ok
Update tools: checking...
curl .... Ok
well they working perfect in docker :) just one problem cant find a way geting work an of my 3 wifi cards on laptop ... any suggessions :)
thats probably mental isusse :)
im new in docker
6.12
Kali 2 - latest
Ralink RT3070
Hi, Its more question than issue,
In Evil Twin attack 9, I've notice that the MAC Address is not fully replicated, there is 1 digit difference, and the original Network stays online, Is this done cause of some legal or ethical reasons or there is a technical reason to not fully replicate the target's IP ?
You already have selected a capture file during this session [/root/Desktop/handshake-01.cap]
Do you want to use this already selected capture file? [Y/n]
y
You already have selected a BSSID during this session and is present in capture file [E8:FC:AF:F4:4E:6A]
Do you want to use this already selected BSSID? [Y/n]
y
You already have selected a dictionary file during this session [/root/Desktop/1]
Do you want to use this already selected dictionary file? [Y/n]
n
Enter the path of a dictionary file :
/root/Desktop/1.txt
The path to the dictionary file is valid. Script can continue...
the 1.txt file
root@kali:~# head -n 10 /root/Desktop/1.txt
11111111
2222222
how to fix the error!
Welcome to airgeddon script v6.12
Kali latest
alfa black
***************************** Exploring for targets *****************************
Exploring for targets option chosen (monitor mode needed)
Selected interface wlan0mon is in monitor mode. Exploration can be performed
When started, press [Ctrl+C] to stop...
Press [Enter] key to continue...
./airgeddon.sh: line 6116: /tmp/nws-01.csv: No such file or directory
No networks found
Press [Enter] key to continue...*
I am using kali nethunter in my leeco le2 x526 with the latest version of airgeddon 7.2.3.
Everything seems to work fine(monitor mode and all) but whenever i try to do evil twin with internet access(with selected my network interface with internet access as rm_datanet0), it doesnt detects internet on it :( . Heres the ping on the selected interface.(ping -I rmdata_net0 github.com)
This interface has internet access...
Waiting fr ur reply and fix :)
v8.01
Parrot Security 3.11
Ralink RT5372
When using an Evil Twin attack, everything seems to work properly, except that the captive portal does not appear to have any contents other than "Wireless network, ESSID:"
While "Explore for targets (wep)" is started, the xterm window also shows wpa targets, but here I expect to only see wep targets; nowadays, wep targets - at least where I live - are few: so, in the "Explore for targets" window I see a lot of wpa targets, which make difficult focus to wep targets. Should be enough to run airodump-ng with the --encrypt wep
flag, to filter out only wep targets.
airgeddon script v6.1
kali sana 2.0
Ralink Technology, Corp. RT2501/RT2573
Insert answer here if apply
When i go WPS attacks menu then i select 7. (bully) Pixie Dust attack its give me error
"You have bully installed (v1.0-22), but not required version. To perform Pixie Dust integrated bully attack you must have at least version v1.1 "
i try to manual updated but not work
root@kali:~# apt-get install bully
Reading package lists... Done
Building dependency tree
Reading state information... Done
bully is already the newest version (1.0-22-0kali2).
bully set to manually installed.
0 upgraded, 0 newly installed, 0 to remove and 1978 not upgraded.
how update my bully pleaSE GUIDE ME
Thank you advance
airgeddon script v6.11
bash version (4.4.11(1)-release)
[ 0.000000] Linux version 4.6.0-kali1-amd64 ([email protected]) (gcc version 5.4.0 20160609 (Debian 5.4.0-6) ) #1 SMP Debian 4.6.4-1kali1 (2016-07-21)
Alpha awus 036h. Realtek RTL8187
The script exits when the item is selected
Capture handshake.
When you press Ctrl + C, for end the scan an error occurs.
***************************** Handshake tools menu *****************************
Interface wlan0mon selected. Mode: Monitor
Select an option from menu :
Select another network interface
Put interface in monitor mode
Put interface in managed mode
Explore for targets (monitor mode needed)
------------ (monitor mode needed for capturing) -------------
Capture Handshake
Clean/optimize Handshake file
Return to main menu
Hint Obtaining a Handshake is only for networks with encryption WPA or WPA2
5
There is no valid target network selected. You'll be redirected to select one
Press [Enter] key to continue...
**************************** Exploring for targets *****************************
Exploring for targets option chosen (monitor mode needed)
Selected interface wlan0mon is in monitor mode. Exploration can be performed
When started, press [Ctrl+C] to stop...
Press [Enter] key to continue...
airgeddon.sh: line 6117: 5
20: syntax error in expression (error token is "20")
root@kali:~/airgeddon#
localhost@localhost-x ~ $ docker run --rm -ti --name airgeddon --net=host --privileged -p 3000:3000 -v /home/localhost/AirgeDDon:/io v1s1t0r1sh3r3/airgeddon
*********************************** Welcome ************************************
Welcome to airgeddon script v6.21
.__ .___ .___
_____ |__|______ ____ ____ __| _/__| _/____ ____
\__ \ | \_ __ \/ ___\_/ __ \ / __ |/ __ |/ _ \ / \
/ __ \| || | \/ /_/ > ___// /_/ / /_/ ( <_> ) | \
(____ /__||__| \___ / \___ >____ \____ |\____/|___| /
\/ /_____/ \/ \/ \/ \/
Developed by v1s1t0r
* . _.---._ .
* .' '. .
_.-~===========~-._ *
. (___________________) *
* \_______/ .
^C
*********************************** Exiting ************************************
Exiting airgeddon script v6.21 - See you soon! :)
Checking if cleaning/restoring tasks are needed...
No tasks to perform on exit
localhost@localhost-x ~ $ docker run --rm -ti --name airgeddon --net=host --privileged -p 3000:3000 -v /home/localhost/AirgeDDon:/io v1s1t0r1sh3r3/airgeddon /bin/bash
root@localhost-x:/opt# exit
exit
localhost@localhost-x ~ $ docker run --rm -ti --name airgeddon --net=host --privileged -p 3000:3000 -v /home/localhost/AirgeDDon:/io v1s1t0r1sh3r3/airgeddon
*********************************** Welcome ************************************
Welcome to airgeddon script v6.21
.__ .___ .___
_____ |__|______ ____ ____ __| _/__| _/____ ____
\__ \ | \_ __ \/ ___\_/ __ \ / __ |/ __ |/ _ \ / \
/ __ \| || | \/ /_/ > ___// /_/ / /_/ ( <_> ) | \
(____ /__||__| \___ / \___ >____ \____ |\____/|___| /
\/ /_____/ \/ \/ \/ \/
Developed by v1s1t0r
* . _.---._ .
* .' '. .
_.-~===========~-._ *
. (___________________) *
* \_______/ .
*********************************** Welcome ************************************
This script is only for educational purposes. Be good boyz&girlz!
Use it only on your own networks!!
Accepted bash version (4.4.11(1)-release). Minimum required version: 4.2
Detecting resolution... Can't be detected!, using standard : 1024x768
If make work xpdyinfo command, the script will be able to calculate your screen resolution and show you the windows in a better way. Depending of the system, the package name could be x11-utils, xdpyinfo, xorg-xdpyinfo, etc.
Known compatible distros with this script :
"Arch" "Backbox" "BlackArch" "CentOS" "Cyborg" "Debian" "Fedora" "Gentoo" "Kali" "Kali arm" "OpenMandriva" "Parrot" "Parrot arm" "Raspbian" "Red Hat" "SuSE" "Ubuntu" "Wifislax"
Detecting system...
Kali Linux (Docker)
Let's check if you have installed what script needs
Press [Enter] key to continue...
Essential tools: checking...
ifconfig .... Ok
iwconfig .... Ok
iw .... Ok
awk .... Ok
airmon-ng .... Ok
airodump-ng .... Ok
aircrack-ng .... Ok
xterm .... Ok
Optional tools: checking...
beef-xss .... Ok
dhcpd .... Ok
wash .... Ok
etterlog .... Ok
dnsspoof .... Ok
reaver .... Ok
hostapd .... Ok
iptables .... Ok
wpaclean .... Ok
bully .... Ok
sslstrip .... Ok
aireplay-ng .... Ok
unbuffer .... Ok
lighttpd .... Ok
crunch .... Ok
ettercap .... Ok
hashcat .... Ok
mdk3 .... Ok
bettercap .... Ok
pixiewps .... Ok
Your distro has all necessary essential tools. Script can continue...
Press [Enter] key to continue...
The automatic update has been disabled when airgeddon is running in a Docker container. If you want to update it, download again the image tagged as "latest"
Press [Enter] key to continue...
8
***************************** airgeddon main menu ******************************
Interface wlp1s0mon selected. Mode: Monitor
5
***************************** Handshake tools menu *****************************
Interface wlp1s0mon selected. Mode: Monitor
4
**************************** Exploring for targets *****************************
Exploring for targets option chosen (monitor mode needed)
Selected interface wlp1s0mon is in monitor mode. Exploration can be performed
When started, press [Ctrl+C] to stop...
Press [Enter] key to continue...
/opt/airgeddon/airgeddon.sh: line 6128: /tmp/nws-01.csv: No such file or directory
No networks found
Press [Enter] key to continue...
im not sure if i supose create them ? :)
I'm running the latest available version of airgeddon on Kali Linux.
After that credentials has been captured (eg wps pin and then wpa password by using before reaver with pixiewps and then by cracking the pin to get the wpa password), these credentials are just displayed inside an xterm window: at least here I am not able to copy and paste the credentials from such xterm window; in facts, airgeddon suggest me:
After stopping the attack (using [Ctrl+C]), the window will not be closed automatically. So you'll have time to write down the password if successful. You'll have to close it manually
I see, however, that such credentials are present in the /tmp/ag.wpsout.txt text file.
Well, by using shell's utilities, like eg awk and grep, we could be able to grab these infos and write them in another text file, like eg, fluxion already does.
Imho would be a great/nice feature of airgeddon.
v8.01
ParrotSec
RTL8814AU
Airgeddon doesn't support Alfa awus1900 wifi dongle.
Can't put in monitor mode and cant start evil twin attacks.
The card use THIS driver.
When i put the card in monitor mode before airgeddon, it is recognise the monitor mode.
At exit, i always choose to set back to managed mode, airgeddon said that set was successfull, but when i check the card with iwfconfig
it is still in monitor mode.
When start evil twin, it said : no such device
in most of terminals.
Introduction:
We discovered serious weaknesses in WPA2, a protocol that secures all modern protected Wi-Fi networks. An attacker within range of a victim can exploit these weaknesses using key reinstallation attacks (KRACKs). Concretely, attackers can use this novel attack technique to read information that was previously assumed to be safely encrypted. This can be abused to steal sensitive information such as credit card numbers, passwords, chat messages, emails, photos, and so on. The attack works against all modern protected Wi-Fi networks. Depending on the network configuration, it is also possible to inject and manipulate data. For example, an attacker might be able to inject ransomware or other malware into websites.
The weaknesses are in the Wi-Fi standard itself, and not in individual products or implementations. Therefore, any correct implementation of WPA2 is likely affected. To prevent the attack, users must update affected products as soon as security updates become available. Note that if your device supports Wi-Fi, it is most likely affected.
More info:
https://raw.githubusercontent.com/necrose99/airgeddon/master/build/Makefile.txt
Its a Touch Fugglly however emake install should hopefully work with a new ebuild ... @ v8.01.tar.gz
or "9999 version" (git-r3.eclass Gentoo, git clone, do emake (Makefile) install or if 9999 else @ stable release , also makes for quick and dirty testing with Gentoo/ @pentoo using a live ebuild/9999
else I have to make a very Uggly Ebuild to Do more of the same work...
and ideal should be anyone could make RPM, or Distro packing via makefile
I also dumped the shell launcher out from Arch "Binary" for symlinking via airgeddon-launch.sh /usr/bin/airgeddon @ ./Build dir..
I can pull if you like , however for now the makefile is untested. I can test latter in vm , main install is down on laptop /dev/sdb time for new HDD ...
also https://stackoverflow.com/questions/2221562/using-gettext-in-bash might be useful for CI
as you can upload a pot to transifex or others like hosted.weblate.org , can likely do some basic Japanese / にほんご or a few others.. and as pot files get translated less of a mess on upkeep on the script file..
However I can Add that to the pull.
6.12
Kali latest
AtherosUB91C
ITs more a question than an issue, Where can I change Evil twean's details , such as design of the login page and url of that page ?
latest
kali linux 2017
raspberry pi
thought about it, and it would be to start brute force at a certain number, which corresponds to the beginning of the number range.
6.11
Insert answer here
When I start the scan with wash gives error,
and I would like to support optirun to decrypt WPA / WPA2 offline,
Erroneous coding of some words
Debian 9 kernel v4.9
ath10k_pci and isl3887usb
Insert answer here if apply
soporte en modo monitor para ath10k_pci
ath10k_pci support monitor mode?
Selecciono la interfaz la pongo en modo monitor le doy a la opcion WPS y a la opcion de scaneo y me reporta error inesperado, hay que primero explorar desde otra funcion para que no de error al iniciar wash solo que al iniciar no devuelve nada
I select the interface I put in monitor mode I give the option WPS and the option of scanning and I report unexpected error, You have to first explore from another function so that it does not error when starting wash only that when starting does not return anything
7
Kali 2
AR9271
*Hi, Could u guide me please, how can I simply create an Access point, Without Ddosing, and With the Exact same MAC address as a target ? *
Regards
On Kali Linux I have permanent error I use Wash either Airgeddon:
[!] Found packet with bad FCS, skipping...
[!] Found packet with bad FCS, skipping...
[!] Found packet with bad FCS, skipping...
[!] Found packet with bad FCS, skipping...
[!] Found packet with bad FCS, skipping...
[!] Found packet with bad FCS, skipping...
Option --ignore-fcs or -C fixed it for me. Would you like to add the option to Wash in Airgeddon?
Hi guys newbie on hacking and cracking wifi.....
running aroung to try and hack some wifi i found the following problem with hashcat decryption,
"The charset to use is: [abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789!"#$%&'()*+,-./:;<=>?@[]^_`{|}~]
Starting decrypt. When started, press [Ctrl+C] to stop...
Press [Enter] key to continue...
hashcat (v4.0.1) starting...
/tmp/hctmp.hccapx: No such file or directory <<<
Started: Fri Apr 6 10:11:12 2018
Stopped: Fri Apr 6 10:11:12 2018
Press [Enter] key to continue..."
i know for sure my lil laptop ain't the top notch for hacking,
but i'm guessing the following error has nothing to do with my laptop performance
/tmp/hctmp.hccapx: No such file or directory <<<
to be sure wasn't a glitch or something i went to check if the file really missing while airgeddon was running,but when i went to /tmp folder i found the file right there along with hctmp.out.
can anybody somebody tell me how to fix it?
coz deep down i really like that tool i mean airgeddon.
anyway i am running parrot 3.11 with the last system wide upgrade made 2 3 days ago,last version of airgeddon 8.01 "or something" ran the update just yesterday from within airgeddon..
coz on system wide upgrade never popped up.
thanks for any help comming in my way..
cheers folks and happy password cracking to ya'll
6.1
Linux kali 4.6.0-kali1-amd64 #1 SMP Debian 4.6.4-1kali1 (2016-07-21) x86_64 GNU/Linux
Realtek Semiconductor Corp. RTL8187 Wireless Adapter
In case of 'Evil Twin AP attack with sniffing and bettercap-sslstrip2/BeEF', we need to get manually BSSID, channel and ESSID.
Is it possible to get a result of 'airodump-ng' or something similar?
Plus, it will help to avoid typing error on this step.
If you find this feature request unhelpfull or irrelevant, feel free to close this issue.
Sincerely,
@wikijm
Have you ever heard of wardriving? It’s the act of searching for and mapping Wi-Fi networks from a moving vehicle. It’s a really cool way to create a map of the wireless signals in a certain location.
Scott Helme shows us it’s not that hard to do. He equipped his car with the right tools, drove around his town and mapped a total of 10,442 access points. He then proceeded to put all of their coordinates together in Google Maps, resulting in the following alternative view of his neighborhood:
http://thenextweb.com/shareables/2016/10/12/wi-fi-wardriving-easy/
I have a wireless adapter that support injection and monitor on 5 ghz network, but some tools (wifite) work only on 2 ghz. Does Airgeddon support 5 ghz ? Thanks
Edit : Indeed i missed the line...
v8.01
Kali Linux v1.1.2.0
dont have one
So i just downloaded airgeddon and I'm pretty new so don't judge if I'm doing this completely wrong, but whenever I go to run it, for the interface options it always just says
Select an interface to work with: --------- DONE truncated Dump terminated
and neither of them are valid. I haven't downloaded all of the optional tools yet, just a few like dnsspoof and wpaclean, etc. How do I get this to actually display a valid/real interface option?
I use Alfa Networks WiFi Adapter (AWUS036H, RTL8187 chipset). Your script uses hostapd to launch AP, which requires AP-mode to be supported, but RTL8187 supports only IBSS, managed and monitor mode. So when I launch the Evil Twin attack, I've got all xterm windows open (dhcpd, sslstrip and so on) and here is the listing of hostapd window:
Configuration file: /tmp/ag.hostapd.conf
nl80211: Could not configure driver mode
nl80211: deinit ifname=wlan0 disabled_11b_rates=0
nl80211 driver initialization failed.
wlan0: interface state UNINITIALIZED->DISABLED
wlan0: AP-DISABLED
hostapd_free_hapd_data: Interface wlan0 wasn't started
All background processes such as sending deauth messages are working but AP doesn't start. Is there a chance to change the method of launching AP (airbase-ng e.g.) or catch this issue on startup?
Thank you.
v8.01
Kali Linux 2018.1 on VirtualBox using Macbook Pro 2012
Realtek Semiconductor Corp. RTL8812AU 802.11a/b/g/n/ac WLAN Adapter
I execute the file airgeddon loads up smoothly, I choose my interface (wlan0 in Managed Mode)
When I want to put my interface into Monitor mode I get, "This interface does not support Monitor mode." Which doesn't make sense because I am able to set monitor mode manually via
Ifconfig wlan0 down
iwconfig wlan0 mode monitor
ifconfig wlan0 up
Bam I'm in monitor mode.
Could this be my device that's not supported with airgeddon or its some just driver issue.
Please let me know, Thank you
I6.12
Kali Latest
black Alfa
*Basically in 499 from 500 attempts I'm getting the following error:
No networks found with Handshake captured on the selected file
Press [Enter] key to continue...
after I'm capturing handshake offered by Evil twin option 9 from the menu, and saving it in default root directory, , is there anything particular I shall know in this ? or any way around ?,
When opening this handshake files, with wireshark, it gives an error saying that : "The capture File appears to have been cut short in the middle of a packet"*
Docker version 18.03.0-ce, build 0520e2430
v1s1t0r1sh3r3/airgeddon:beta
v1s1t0r1sh3r3/airgeddon:latest
Archlinux latest
Intel Corporation Centrino Advanced-N 6205 [Taylor Peak] (rev 34)
Error "/opt/airgeddon/airgeddon.sh: line 8393: /tmp/nws-01.csv: No such file or directory" shows up when i choosing option 4 ("4. Explore for targets (monitor mode needed").
'ls' command on docker filesystem show that there may be some problems with 2 files in /tmp directory
echo $DISPLAY inside container shows my display, ':0'
airgeddon execution:
https://pastebin.com/AYK3iTy7
some docker fs-layer commands:
https://pastebin.com/H07tSmsj
reaver .... Ok
hostapd .... Ok
iptables .... Ok
wpaclean .... Ok
bully .... Ok
sslstrip .... Ok
aireplay-ng .... Ok
beef .... Error (Possible package name : beef-xss / beef-project)
unbuffer .... Ok
lighttpd .... Ok
crunch .... Ok
ettercap .... Ok
hashcat .... Ok
mdk3 .... Ok
bettercap .... Error (Possible package name : bettercap)
pixiewps .... Ok
Update tools: checking...
curl .... Ok
Your distro has the essential tools but it hasn't some optional. The script can continue but you can't use some features
. It is recommended to install missing tools
Press [Enter] key to continue...
The script will check for internet access looking for a newer version. Please be patient...
Please note that i am NOT running kali inside a vm or in dual boot. I am instead running kali inside the windows 10 subsystem inside the command prompt.
Null
Null
Null
Please remove wpaclean support. It is known to corrupt capture files and can not be used when converting to hccapx for use with hashcat. There is no benefit to even leaving it as an option because it is very, very broken. Capture files either need to be manually cleaned for optimal performance, or just run through cap2hccapx (granted multiple handshakes will result in HUGE speed decreases).
Hello @v1s1t0r1sh3r3 ,
Sorry I am new to github and don't know where to post a recommendation. Please let me know for future reference. I enjoy testing this kind of programs and I have tested so far: Fluxion, wifiphisher, and Captive portal for wifi pineapple.
airgeddon is stable, and the verbosity makes it easy to understand what is happening .. and so far, it is the most stable and flexible of the bunch. So I would like to collaborate in giving as much feedback as possible to make it the ultimate tool.
Have not yet tested the beef module so I will not comment yet.
for wifi handshake: super easy to use and effective!
Recommendation:
1- color code the Client discovery section. Meaning, if AP has clients make it red, if not yellow. if it has WPS then let WPS be in Blue . I also recommend putting all text in bold to make it more visible.
2- If you can get router discovery detail to show that would be great (check wifiphisher code for that)
I will post more feedback the more I go through it.
Apologies if it is in the wrong section
I am using the new menue "evil twin"
To grab the handshake i use airgeddon itself
The handshake is correctly captured
I indicate a path in a non root directory and the handshake is correctly saved (handshake-01.cap)
Unfortunately airegeddon does not detect it properly at this stage.
As it named it by itself i deduce that airgeddon should be able to handle it and that entering the path and not the absolute path is enough.
Cheers
Hi I have installed Kali Linux 2017.1 and Airgeddon I'm using an external Alfa as my monitor card & a TPLink External USB for my managed interface.
I'm using internal Intel Wifi as my Internet connection. I'm connecting to a Portable Mobile Hotspot on a Android Phone.
I have a laptop to do some testing with it has Windows 10 I connect to access point however it still does not get Internet but it does successfully assign an IP to it when using my mobile my Internet hosts local IP becomes 192.168.43.49 and I was wondering due to this IP range could this be the problem why it does not get Internet access by the way really nice script great work.
Also have you used a Mobile Hotspot before with airgeddon or a 3g modem thanks in advance.
On some systems like Kali Linux 2016.2 , hashcat version was updated to v3. On this version there are unified the gpu and the cpu commands using parameters "- D 1|2|3" while on old v2 versions hashcat command is only for cpu and for gpu other commands are used "oclhashcat". Not only this changed... the output when a password is successfully cracked changed too. On v3 the string "All hashes have been recovered" seems is not shown anymore and airgeddon bases its parse on this.
TODO tasks list:
hashcat version detection
Change the command line depending of hashcat version
Parse the output for successfully cracking in a different way depending of hashcat version
8.01
Kali Linux 2018.3? (up to date from kali-roing repo)
RTL8188CUS
Line 6027 in ae4a1e3
I'm not sure if this is ultimately required here - but i presume it also can be enclosed in the:
if [ "${check_kill_needed}" -eq 1 ]; then
A declarative, efficient, and flexible JavaScript library for building user interfaces.
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
An Open Source Machine Learning Framework for Everyone
The Web framework for perfectionists with deadlines.
A PHP framework for web artisans
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
Some thing interesting about web. New door for the world.
A server is a program made to process requests and deliver data to clients.
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
Some thing interesting about visualization, use data art
Some thing interesting about game, make everyone happy.
We are working to build community through open source technology. NB: members must have two-factor auth.
Open source projects and samples from Microsoft.
Google ❤️ Open Source for everyone.
Alibaba Open Source for everyone
Data-Driven Documents codes.
China tencent open source team.