Airbash is a POSIX-compliant, fully automated WPA PSK handshake capture script aimed at penetration testing. It is compatible with Bash and Android Shell (tested on Kali Linux and Cyanogenmod 10.2) and uses aircrack-ng to scan for clients that are currently connected to access points (AP). Those clients are then deauthenticated in order to capture the handshake when attempting to reconnect to the AP. Verification of a captured handshake is done using aircrack-ng. If one or more handshakes are captured, they are entered into an SQLite3 database, along with the time of capture and current GPS data (if properly configured).
After capture, the database can be tested for vulnerable router models using
crackdefault.sh. It will search for entries that match the implemented modules, which currently include algorithms to compute default keys for Speedport 500-700 series, Thomson/SpeedTouch and UPC 7 digits (UPC1234567) routers.Requirements
WiFi interface in monitor mode aircrack-ng SQLite3 openssl for compilation of modules (optional) wlanhc2hcx from hcxtools
In order to log GPS coordinates of handshakes, configure your coordinate logging software to log to .loc/*.txt (the filename can be chosen as desired). Airbash will always use the output of
cat "$path$loc"*.txt 2>/dev/null | awk 'NR==0; END{print}', which equals to reading all .txt files in .loc/ and picking the second line. The reason for this way of implementation is the functionality of GPSLogger, which was used on the development device.Calculating default keys
After capturing a new handshake, the database can be queried for vulnerable router models. If a module applies, the default keys for this router series are calculated and used as input for aircrack-ng to try and recover the passphrase.
Compiling Modules
The modules for calculating Thomson/SpeedTouch and UPC1234567 (7 random digits) default keys are included in
src/Credits for the code go to the authors Kevin Devine and [peter@haxx.in].
On Linux:
gcc -fomit-frame-pointer -O3 -funroll-all-loops -o modules/st modules/stkeys.c -lcrypto
gcc -O2 -o modules/upckeys modules/upc_keys.c -lcryptoUsage
Running
install.sh will create the database, prepare the folder structure and create shortlinks to both scripts which can be moved to a directory that is on $PATH to allow execution from any location.After installation, you may need to manually adjust
INTERFACE on line 46 in airba.sh. This will later be determined automatically, but for now the default is set to wlan0, to allow out of the box compatibility with bcmon on Android../airba.sh starts the script, automatically scanning and attacking targets that are not found in the database. ./crackdefault.sh attempts to break known default key algorithms.To view the database contents, run
sqlite3 .db.sqlite3 "SELECT * FROM hs" in the main directory.Update (Linux only ... for now):
Airbash can be updated by executing
update.sh. This will clone the master branch into /tmp/ and overwrite the local files.Output
_n: number of access points found__c/m: represents client number and maximum number of clients found, respectively-: access point is blacklistedx: access point already in database?: access point out of range (not visible to airodump anymore)The Database
The database contains a table called
hs with seven columns.id: incrementing counter of table entrieslat and lon: GPS coordinates of the handshake (if available)bssid: MAC address of the access pointessid: Name identifierpsk: WPA Passphrase, if knownprcsd: Flag that gets set by crackdefault.sh to prevent duplicate calculation of default keys if a custom passphrase was used.Currently, the SQLite3 database is not password-protected.
Related articles
- Pentest Tools Android
- Pentest Tools
- Hacking Tools For Games
- Hacker Tools For Ios
- Hacker
- Best Pentesting Tools 2018
- Hack Tools Pc
- New Hack Tools
- Hacker Tools Free
- Pentest Tools For Mac
- Growth Hacker Tools
- Hacking Tools Pc
- Hacker Hardware Tools
- Pentest Tools Review
- Nsa Hack Tools
- Hacking Tools For Kali Linux
- Hack Tools
- Hacking Tools For Mac
- Hacker Tools
- Bluetooth Hacking Tools Kali
- Blackhat Hacker Tools
- Hacker Hardware Tools
- Hack Tools
- Hacking Tools Windows 10
- Hacker Hardware Tools
- Pentest Tools Kali Linux
- Hacker Tools Github
- Hackers Toolbox
- Nsa Hack Tools Download
- Easy Hack Tools
- Pentest Tools Alternative
- Hacker Tools Software
- Hacker Tools Apk
- Hacking Tools Usb
- Nsa Hack Tools
- Hacker Techniques Tools And Incident Handling
- Underground Hacker Sites
- Hack Tools Mac
- Physical Pentest Tools
- Best Pentesting Tools 2018
- Pentest Tools Framework
- Bluetooth Hacking Tools Kali
- Computer Hacker
- How To Make Hacking Tools
- Termux Hacking Tools 2019
- Tools For Hacker
- Hack Tools 2019
- Hacker Tools Hardware
- Hackers Toolbox
- Hacking Tools For Pc
- Hack Rom Tools
- Hacker Tools
- Hak5 Tools
- Tools Used For Hacking
- Hacker Tools
- Hacking Tools Software
- Pentest Tools Kali Linux
- Install Pentest Tools Ubuntu
- Hacking Tools Windows
- Pentest Tools For Windows
- Hacker Security Tools
- Tools Used For Hacking
- Hack Tools 2019
- Hack Tools Download
- Hack Tools For Windows
- Hack Website Online Tool
- Tools Used For Hacking
- Hacking Tools Name
- Hack Tools
- New Hacker Tools
- Pentest Tools Find Subdomains
- Hacker Tools Apk
- Hacking Tools For Windows 7
- How To Make Hacking Tools
- Best Hacking Tools 2020
- Pentest Tools Online
- Hacking Tools And Software
- Hack Tools Github
- Best Hacking Tools 2019
- Hacking Tools Download
- How To Make Hacking Tools
- Pentest Tools Nmap
- World No 1 Hacker Software
- Tools Used For Hacking
- Hak5 Tools
- Hacking Tools And Software
- Pentest Tools Nmap
- Hacking Tools
- Hacking Tools For Mac
- Pentest Tools Website
- Hack Tools Mac
- Hacking Tools 2019
- Pentest Box Tools Download
- Underground Hacker Sites
- Hack Tools For Mac
- Hack Tools For Windows
- Pentest Tools Port Scanner
- Install Pentest Tools Ubuntu
- Hack App
- Hacker Tools Software
- Hacker Techniques Tools And Incident Handling
- Pentest Tools Bluekeep
- Best Pentesting Tools 2018
- Hak5 Tools
- Hacker Tools Free Download
- Hack Tools Github
- Hacking App
- Hacker Tools List
- Hack Tools 2019
- Hacking Tools
- Best Hacking Tools 2020
- Pentest Tools Nmap
- New Hacker Tools
- Hack And Tools
- Hack Rom Tools
- Growth Hacker Tools
- Ethical Hacker Tools
- Hacking Tools And Software
- Hacker Tools Apk Download
- Tools Used For Hacking
- Pentest Tools Website Vulnerability
- Pentest Tools Website Vulnerability
- Hacking Tools 2020
- Computer Hacker
- Black Hat Hacker Tools
- How To Make Hacking Tools
- Hacking Tools Github
- Pentest Tools Subdomain
- Termux Hacking Tools 2019
- Hacker Search Tools
- Top Pentest Tools
- Hak5 Tools
- Free Pentest Tools For Windows
- Hacking Tools Windows 10
- Hacker Tools Software
- Hacking Tools Usb
- Top Pentest Tools
- Hacking Tools Kit
- Hacking Tools 2020
- Hacker Search Tools
- Pentest Tools Download
- World No 1 Hacker Software
- Hacking Tools Github
- Pentest Tools Alternative
- Tools For Hacker
- Pentest Tools Windows
- Hacking Tools Windows
- Tools 4 Hack
- Kik Hack Tools

No comments:
Post a Comment