Airba.sh - A POSIX-compliant, Fully Automated WPA PSK Handshake Capture Script Aimed At Penetration Testing



Airbash is a POSIX-compliant, fully automated WPA PSK handshake capture script aimed at penetration testing. It is compatible with Bash and Android Shell (tested on Kali Linux and Cyanogenmod 10.2) and uses aircrack-ng to scan for clients that are currently connected to access points (AP). Those clients are then deauthenticated in order to capture the handshake when attempting to reconnect to the AP. Verification of a captured handshake is done using aircrack-ng. If one or more handshakes are captured, they are entered into an SQLite3 database, along with the time of capture and current GPS data (if properly configured).
After capture, the database can be tested for vulnerable router models using crackdefault.sh. It will search for entries that match the implemented modules, which currently include algorithms to compute default keys for Speedport 500-700 series, Thomson/SpeedTouch and UPC 7 digits (UPC1234567) routers.

Requirements
WiFi interface in monitor mode aircrack-ng SQLite3 openssl for compilation of modules (optional) wlanhc2hcx from hcxtools
In order to log GPS coordinates of handshakes, configure your coordinate logging software to log to .loc/*.txt (the filename can be chosen as desired). Airbash will always use the output of cat "$path$loc"*.txt 2>/dev/null | awk 'NR==0; END{print}', which equals to reading all .txt files in .loc/ and picking the second line. The reason for this way of implementation is the functionality of GPSLogger, which was used on the development device.

Calculating default keys
After capturing a new handshake, the database can be queried for vulnerable router models. If a module applies, the default keys for this router series are calculated and used as input for aircrack-ng to try and recover the passphrase.

Compiling Modules
The modules for calculating Thomson/SpeedTouch and UPC1234567 (7 random digits) default keys are included in src/
Credits for the code go to the authors Kevin Devine and [peter@haxx.in].
On Linux:
gcc -fomit-frame-pointer -O3 -funroll-all-loops -o modules/st modules/stkeys.c -lcrypto
gcc -O2 -o modules/upckeys modules/upc_keys.c -lcrypto
If on Android, you may need to copy the binaries to /system/xbin/ or to another directory where binary execution is allowed.

Usage
Running install.sh will create the database, prepare the folder structure and create shortlinks to both scripts which can be moved to a directory that is on $PATH to allow execution from any location.
After installation, you may need to manually adjust INTERFACE on line 46 in airba.sh. This will later be determined automatically, but for now the default is set to wlan0, to allow out of the box compatibility with bcmon on Android.
./airba.sh starts the script, automatically scanning and attacking targets that are not found in the database. ./crackdefault.sh attempts to break known default key algorithms.
To view the database contents, run sqlite3 .db.sqlite3 "SELECT * FROM hs" in the main directory.

Update (Linux only ... for now):
Airbash can be updated by executing update.sh. This will clone the master branch into /tmp/ and overwrite the local files.

Output
_n: number of access points found
__c/m: represents client number and maximum number of clients found, respectively
-: access point is blacklisted
x: access point already in database
?: access point out of range (not visible to airodump anymore)

The Database
The database contains a table called hs with seven columns.
id: incrementing counter of table entries
lat and lon: GPS coordinates of the handshake (if available)
bssid: MAC address of the access point
essid: Name identifier
psk: WPA Passphrase, if known
prcsd: Flag that gets set by crackdefault.sh to prevent duplicate calculation of default keys if a custom passphrase was used.
Currently, the SQLite3 database is not password-protected.


Related posts
  1. Install Pentest Tools Ubuntu
  2. Hacking Tools For Windows Free Download
  3. Pentest Tools Kali Linux
  4. Hacking Tools For Mac
  5. Pentest Tools Linux
  6. Top Pentest Tools
  7. Hacker Tools Apk Download
  8. Hack Tools For Mac
  9. Hacker Tools Apk Download
  10. Hacking Tools Hardware
  11. Best Pentesting Tools 2018
  12. Hacking Tools Name
  13. Hackrf Tools
  14. Usb Pentest Tools
  15. How To Install Pentest Tools In Ubuntu
  16. Pentest Tools Nmap
  17. New Hack Tools
  18. Install Pentest Tools Ubuntu
  19. Hacker Tools Github
  20. Hacker Tools Hardware
  21. Game Hacking
  22. Hacker Tools For Mac
  23. Install Pentest Tools Ubuntu
  24. Hacker Tools Online
  25. Hacking Tools
  26. How To Hack
  27. Underground Hacker Sites
  28. Pentest Automation Tools
  29. Hacker Tools Apk Download
  30. What Are Hacking Tools
  31. Tools For Hacker
  32. Hacking Tools For Mac
  33. Pentest Tools Bluekeep
  34. Hacker Tools For Windows
  35. Hacker Tools For Windows
  36. Hack App
  37. How To Make Hacking Tools
  38. Pentest Tools Windows
  39. Hack Tools Github
  40. Bluetooth Hacking Tools Kali
  41. Hack Rom Tools
  42. Hack Tools Online
  43. Hacking Tools 2020
  44. Growth Hacker Tools
  45. Hacker Hardware Tools
  46. Hacking Tools And Software
  47. Bluetooth Hacking Tools Kali
  48. Pentest Tools Url Fuzzer
  49. Best Hacking Tools 2020
  50. Hacker Tools Free Download
  51. Pentest Recon Tools
  52. Hacker Tools Apk
  53. How To Make Hacking Tools
  54. Pentest Tools Free
  55. Hacker Tools Apk Download
  56. Hacker Security Tools
  57. Hacking Tools 2019
  58. Hack App
  59. Hack Tools For Mac
  60. Hack Apps
  61. Hack App
  62. Tools Used For Hacking
  63. Tools For Hacker
  64. What Are Hacking Tools
  65. Hacking Tools Pc
  66. Hacking Tools Software
  67. Hackers Toolbox
  68. Hacking Tools For Pc
  69. Hacking Tools For Kali Linux
  70. Hack Tools For Windows
  71. Pentest Tools Apk
  72. Hacker Tool Kit
  73. Ethical Hacker Tools
  74. Hacking Tools Pc
  75. Hack Tools 2019
  76. Hacking Tools Github
  77. Pentest Tools Nmap
  78. Black Hat Hacker Tools
  79. Hacking Tools Name
  80. Pentest Tools Android
  81. New Hacker Tools
  82. Hacking Tools Free Download
  83. Hackrf Tools
  84. Pentest Tools Kali Linux
  85. Pentest Recon Tools
  86. Hacking Tools For Windows Free Download
  87. Hacking Tools Windows 10
  88. Hacking Tools 2019
  89. Hacker Tools Linux
  90. Pentest Tools Framework
  91. Hacker Hardware Tools
  92. Hacking Tools For Pc
  93. Hack And Tools
  94. Best Hacking Tools 2019
  95. Hacker Tools Linux
  96. Hacker
  97. Hack Tools For Games
  98. Hack Tools For Ubuntu
  99. Hack Tools
  100. Pentest Tools Website Vulnerability
  101. World No 1 Hacker Software
  102. Best Pentesting Tools 2018
  103. Hacker Tools Windows
  104. Hacking Tools Usb
  105. Hacker Tools Apk Download
  106. Hack App
  107. Hacking App
  108. Hacker Tools For Ios
  109. Hacking Tools For Games
  110. Github Hacking Tools
  111. Hacker Tools For Windows
  112. Pentest Tools Windows
  113. Hacking Tools For Windows
  114. Pentest Box Tools Download
  115. Hacking Tools Online
  116. Underground Hacker Sites
  117. Hack Tools Download
  118. Hack Tools For Pc
  119. Hacker Tools Mac
  120. Tools 4 Hack
  121. Bluetooth Hacking Tools Kali
  122. Hacking Tools Github
  123. Pentest Tools Nmap
  124. Pentest Tools
  125. Hack Tools 2019
  126. Hacking Tools For Beginners
  127. Pentest Box Tools Download
  128. Pentest Tools For Mac
  129. Hacking Tools Kit
  130. Hacking Tools Free Download
  131. Pentest Tools Android
  132. Pentest Tools Windows
  133. Ethical Hacker Tools

No comments:

Post a Comment