Commit Graph

32 Commits

Author SHA1 Message Date
derv82
3257755094 Some "hidden" helper switches (-nd --no-deauths --nodeauths)
When skipping an attack (WPA/WPS), explain why and mention the AP ESSID
2018-03-10 16:00:17 -05:00
derv82
0bfc82c356 BUGFIX: Detect when Reaver/Bully is successful.
Reported in #60

Also removed PIN attack.
2018-03-10 15:59:52 -05:00
derv82
82f0a2ae96 Trying to fix bully & reaver Pixie-Dust attacks.
Haven't even looked at PIN attacks yet.

Hopefully helps out with #28
2018-03-03 23:40:15 -05:00
derv82
aaf7845177 --bully option to use bully (instead of reaver).
Previously used bully by-default.
Removed Configurations named 'reaver' (instead of 'WPS attack')

Should resolve #39
2018-02-28 04:36:06 -05:00
derv82
c4773c6d1a Use bully instead of reaver.
Detailed WPS output.

TODO:
* Actually test that cracked PINs are detected & saved, pending #28
* Command-line options to specify max lockout/timeout/noassoc/failure
2017-05-17 23:19:49 -04:00
derv82
c19332c25c Enable persistent fakeauth, bypass AP detection when deauthing.
AP bypass should make 5ghz deauths work for all systems (should fix #24)
2017-05-17 05:55:48 -04:00
derv82
5d44c1b0c4 Remove --delay=0 and --no-nacks from Reaver PixieDust attack
I can't get the PixieDust attack to work to save my life.
2017-05-17 05:08:49 -04:00
derv82
a226cdb9a1 Added --nodeauths command, try to fix WEP replay attacks.
Aireplay can optionally NOT store the process output (via `devnull=False`).
By-default, Aireplay attacks will not capture aireplay-ng output, to
avoid deadlock when overloading the OS buffer (see #21).
2017-05-15 20:36:04 -04:00
derv82
ecfeeaae41 Decloak hidden APs when channel is fixed 2017-05-14 17:26:13 -04:00
derv82
02df6ed084 Minor reformatting 2017-05-14 15:37:05 -04:00
derv82
890915b9b3 Output target info during WPS attacks.
Also using reaver's --no-nacks option
2017-05-14 15:37:05 -04:00
derv82
62503b0d0c Various small fixes + tweaks 2017-05-14 15:37:05 -04:00
derv82
842144129a Fixing reaver & wash 2017-05-14 15:37:05 -04:00
goll
260cc35dd5 Hardcode python2.7 shebang 2016-07-03 17:31:41 +02:00
derv82
8b5f5ce3f4 Fix deauth, Pixie step timeout, better handshake options.
Deauth now deauths clients (whoops).
Checks all handshakes if no filename is given to --check-hs
Times out a --pixie attack if the step does not change in 30 seconds.
2016-04-16 13:15:23 -04:00
derv82
3847f2c5c9 Lots of fixes.
1. WEP attack gracefully handles ctrl+c
2. Very verbose (-vv) prints out commands and output
3. Doesn't fetch WPS info when attacking WEP
2016-01-04 18:20:25 -05:00
derv82
c5ffac75c5 Ignore -1 channels, bug/crash fix, support newer tshark 2016-01-01 02:04:10 -05:00
derv82
746da03580 Adding 5ghz support 2015-12-28 12:52:29 -05:00
derv82
ac50614e5b Reformat when WPS PIN attack succeeds 2015-06-15 00:55:04 -07:00
derv82
491854ddb0 Derive WPS pins left. ETA is sticky 2015-06-12 22:54:22 -07:00
derv82
f839ad4818 WPS max_failures is honored now.
Handshake attack copies .cap file to temp for consistency.
2015-06-12 22:34:44 -07:00
derv82
b79025f1dc More aircrack 1.2 rc1 fixes
Airmon-ng works.
* Deletes conflicting processes on rc1, need to test on rc2 before
  adding to Wifite.py (main).

WPS PIN-attack *sort of* works for reaver 1.4. Needs a way to derive
    current pin count when restarting a session.
2015-06-11 22:35:06 -07:00
derv82
633d11b7d1 Backwards compatibility attempt #1
Got a fresh copy of Kali 1.1.0, didn't upgrade aircrack or reaver.

Supports:
* Aircrack-ng 1.2 rc1
* Reaver 1.4
2015-06-10 00:59:04 -07:00
derv82
27e786803a Trying to add support for older versions of reaver 2015-06-09 22:00:48 -07:00
derv82
f90aa7f7d6 WPS PIN attack: show percentage 2015-06-08 23:10:23 -07:00
derv82
920970f4e7 Fix configuration/argument for wps rate limits
Also made WPS PIN attack prettier
2015-06-07 16:37:10 -07:00
derv82
337bed23c6 WPS pin attack mostly works.
Haven't tested if it reads the PIN or not...
Also fixed bugs in configuratin/arguments setup.
2015-06-06 22:51:56 -07:00
derv82
345472f379 Save cracked networks to file. Verbose configuration options. 2015-06-04 23:41:56 -07:00
derv82
3faa01c9e8 All config value can be set via arguments
But not all config values are honored during attacks (whoops).
2015-06-02 23:14:11 -07:00
derv82
7148040199 Prettier output on WPS/WPA attacks 2015-06-02 07:59:22 -07:00
derv82
ff66d08308 WPS PixieDust attack support
Fixed encryption filtering.
More WPS-specific configurations.
Various fixes.
2015-06-02 07:31:41 -07:00
derv82
aebc38c631 Handshake detection, various bug fixes. 2015-05-30 05:35:36 -07:00