Airbash is a POSIX-compliant, fully automated WPA PSK handshake capture script aimed at penetration testing. It is compatible with Bash and Android Shell (tested on Kali Linux and Cyanogenmod 10.2) and uses aircrack-ng to scan for clients that are currently connected to access points (AP). Those clients are then deauthenticated in order to capture the handshake when attempting to reconnect to the AP. Verification of a captured handshake is done using aircrack-ng. If one or more handshakes are captured, they are entered into an SQLite3 database, along with the time of capture and current GPS data (if properly configured).
After capture, the database can be tested for vulnerable router models using
crackdefault.sh
. It will search for entries that match the implemented modules, which currently include algorithms to compute default keys for Speedport 500-700 series, Thomson/SpeedTouch and UPC 7 digits (UPC1234567) routers.Requirements
WiFi interface in monitor mode aircrack-ng SQLite3 openssl for compilation of modules (optional) wlanhc2hcx from hcxtools
In order to log GPS coordinates of handshakes, configure your coordinate logging software to log to .loc/*.txt (the filename can be chosen as desired). Airbash will always use the output of
cat "$path$loc"*.txt 2>/dev/null | awk 'NR==0; END{print}'
, which equals to reading all .txt files in .loc/ and picking the second line. The reason for this way of implementation is the functionality of GPSLogger, which was used on the development device.Calculating default keys
After capturing a new handshake, the database can be queried for vulnerable router models. If a module applies, the default keys for this router series are calculated and used as input for aircrack-ng to try and recover the passphrase.
Compiling Modules
The modules for calculating Thomson/SpeedTouch and UPC1234567 (7 random digits) default keys are included in
src/
Credits for the code go to the authors Kevin Devine and [peter@haxx.in].
On Linux:
gcc -fomit-frame-pointer -O3 -funroll-all-loops -o modules/st modules/stkeys.c -lcrypto
gcc -O2 -o modules/upckeys modules/upc_keys.c -lcrypto
Usage
Running
install.sh
will create the database, prepare the folder structure and create shortlinks to both scripts which can be moved to a directory that is on $PATH to allow execution from any location.After installation, you may need to manually adjust
INTERFACE
on line 46 in airba.sh
. This will later be determined automatically, but for now the default is set to wlan0
, to allow out of the box compatibility with bcmon on Android../airba.sh
starts the script, automatically scanning and attacking targets that are not found in the database. ./crackdefault.sh
attempts to break known default key algorithms.To view the database contents, run
sqlite3 .db.sqlite3 "SELECT * FROM hs"
in the main directory.Update (Linux only ... for now):
Airbash can be updated by executing
update.sh
. This will clone the master branch into /tmp/ and overwrite the local files.Output
_n
: number of access points found__c/m
: represents client number and maximum number of clients found, respectively-
: access point is blacklistedx
: access point already in database?
: access point out of range (not visible to airodump anymore)The Database
The database contains a table called
hs
with seven columns.id
: incrementing counter of table entrieslat
and lon
: GPS coordinates of the handshake (if available)bssid
: MAC address of the access pointessid
: Name identifierpsk
: WPA Passphrase, if knownprcsd
: Flag that gets set by crackdefault.sh to prevent duplicate calculation of default keys if a custom passphrase was used.Currently, the SQLite3 database is not password-protected.
More info
- Hacker Tools Github
- Hacker Tools For Windows
- Physical Pentest Tools
- Pentest Tools Download
- Hacking Tools For Games
- Hack And Tools
- Pentest Recon Tools
- New Hacker Tools
- Hacking Tools Mac
- Hacker Tools For Mac
- World No 1 Hacker Software
- Pentest Tools Alternative
- Hacker Search Tools
- Nsa Hacker Tools
- Hacker Search Tools
- Hackers Toolbox
- Hack Rom Tools
- Pentest Automation Tools
- Hacker Search Tools
- How To Install Pentest Tools In Ubuntu
- Hacks And Tools
- Pentest Reporting Tools
- Hack Tools For Ubuntu
- Pentest Tools Framework
- Ethical Hacker Tools
- What Are Hacking Tools
- Hacker Tools Mac
- Hacker Tools List
- Hacking Tools For Windows Free Download
- Pentest Tools Alternative
- Hacker Tools Apk Download
- Hack Tool Apk
- Best Pentesting Tools 2018
- Hacking Tools And Software
- Hacker Tools Hardware
- Hack Tool Apk
- Pentest Tools Website
- Pentest Tools Free
- Pentest Tools For Windows
- Hackrf Tools
- Hack Tools For Games
- Termux Hacking Tools 2019
- Hacking Tools 2019
- Hacking Tools For Windows Free Download
- Pentest Tools Kali Linux
- Hack Tool Apk
- Hack Tools Pc
- Pentest Tools Free
- How To Hack
- Hack Tools
- Hack Tools For Games
- Hacks And Tools
- Hacker Tools List
- Pentest Tools Alternative
- Hacking Tools 2019
- Hacking Tools Hardware
- Pentest Recon Tools
- Hacking Tools And Software
- Hacker Hardware Tools
- Pentest Tools Download
- Hak5 Tools
- New Hack Tools
- Hacker Tool Kit
- Pentest Tools For Ubuntu
- Pentest Tools Review
- Top Pentest Tools
- Hack Tools
- Computer Hacker
- Hacker Tools Github
- Black Hat Hacker Tools
- How To Install Pentest Tools In Ubuntu
- Hacker Tools Mac
- Pentest Tools Github
- Hacker Tools For Pc
- Hack Tools Online
- Pentest Tools Windows
- Pentest Automation Tools
- Hacking Tools
- Pentest Tools Github
- Hack Apps
- Pentest Tools Online
- Pentest Tools Nmap
- How To Make Hacking Tools
- Hacker Tools 2020
- Hack Tools For Mac
- Hacker Tools Software
- Pentest Tools Url Fuzzer
- Pentest Tools
- Hacker Tools For Windows
- Hacking Tools Name
- Hacking Tools For Pc
- Hacking Tools For Windows
- Pentest Tools For Mac
- Hacker Tools Apk Download
- Pentest Tools Linux
- Best Hacking Tools 2020
- Pentest Tools Open Source
- Hacking Tools For Pc
- Hacker Tools Hardware
- Pentest Tools Review
- Usb Pentest Tools
- Best Pentesting Tools 2018
- Hacker Tools Linux
- New Hack Tools
- Pentest Tools Windows
- Best Hacking Tools 2020
- Pentest Tools Subdomain
- Pentest Tools Kali Linux
- Best Hacking Tools 2019
- Pentest Automation Tools
- Hacker Tools For Mac
- Pentest Tools Website
- Hacking Tools Usb
- Growth Hacker Tools
- Tools 4 Hack
- Nsa Hack Tools Download
- Wifi Hacker Tools For Windows
- Best Pentesting Tools 2018
- Hacker Search Tools
- Physical Pentest Tools
- Pentest Tools Windows
- Hacking Tools For Pc
- Hacking Tools Hardware
- Hacker Tools Linux
- Hacking Tools For Windows 7
- Hacking Tools Windows 10
- Tools Used For Hacking
- Pentest Tools Android
- Hacker Tools
- Pentest Tools Bluekeep
- Pentest Tools Website
- Hacker Tools Apk
- Hack Website Online Tool
- Hack Apps
- Hacker Tools Linux
- Hacker Tools 2019
- Hacking Tools Pc
- Pentest Box Tools Download
- Ethical Hacker Tools
- Game Hacking
- Hacker Tools Linux
- Bluetooth Hacking Tools Kali
- Hacking Tools For Pc
- Hack Tools For Ubuntu
- Pentest Tools For Android
- Hacking Tools Windows 10
- New Hacker Tools
No comments:
Post a Comment