• Stars
    star
    189
  • Rank 203,699 (Top 5 %)
  • Language
    Shell
  • License
    MIT License
  • Created over 3 years ago
  • Updated almost 3 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Automatically grab and crack WPA-2 handshakes with distributed client-server architecture

Airstrike

Sammler

Tool that automates cracking of WPA-2 Wi-Fi credentials using client-server architecture

Requirements

Airstrike uses Hashcat Brain Architecture, aircrack-ng suite, entr utility and some helper scripts.

You can use install.sh script to download all dependencies (if you're on system which has an access to apt or pacman, but if you're using Gentoo, you'd have to install hcxtools by hand, they're not available in their repos, or maybe I've missed something. Some other uncommon distros are not included, for example Alpine doesn't have hashcat package, but if you're distro is exotic, you can use Nix on that, all needed packages are in nixpkgs.)

If you're using Nix/NixOS, you can jump into Nix-Shell with needed dependencies with: nix-shell -p hashcat hashcat-utils aircrack-ng entr hcxtools

Usage

Run aircrack_server.sh on the machine on which you want to crack passwords. This script builds aircrack_client.sh file, which can be executed on any Linux host that is able to connect with the server started earlier. Upon execution, the client automatically captures handshakes, connects with the server and sends captured data.

Whenever a password is sucessfully cracked by the server, the watcher.sh script prints it out to terminal on the server side.

The only required option flag for airstrike_client.sh is the -w flag: it specifies the wordlist that should be used by the server. Listening interface can be specified with -i flag. By default, a current wireless interface is automatically selected. Additionally, airstrike_client.sh listens for WPA-2 data without any filter, so it will capture and crack all of the passwords of all Wi-Fi networks in range (whenever handshakes are exchanged).

Navigation

Ctrl + S will send capturd assets (Wi-Fi hansdhakes in .hccapx form) to the server. Ctrl + I disaplays information about capture progress.

Above shortcuts can be used inside a running instance of airstrike_client.sh

made with ❤️ by Red Code Labs <*>

More Repositories

1

neurax

A framework for constructing self-spreading binaries
Go
992
star
2

Coldfire

Golang malware development library
Go
924
star
3

Bashark

Bash post exploitation toolkit
Shell
713
star
4

easyWSL

Create WSL distros based on Docker Images.
C#
555
star
5

Citadel

Collection of pentesting scripts
Shell
429
star
6

Revssl

A script that automates generation of OpenSSL reverse shells
Shell
298
star
7

SNOWCRASH

A polyglot payload generator
Go
238
star
8

GoSH

Golang reverse/bind shell generator
Go
225
star
9

RedNixOS

NixOS-based 'distro' for cybersecurity enthusiasts
Nix
179
star
10

Netenum

A tool to passively discover active hosts on a network
Python
155
star
11

Sammler

A tool to extract useful data from documents
Go
154
star
12

VTSCAN

VirusTotal API script
Python
134
star
13

RedNix

Hackable NixOS container
Nix
123
star
14

BMJ

Code snippets for bare-metal malware development
Assembly
95
star
15

YAS

Yet Another Sniffer for monitoring network traffic
Python
83
star
16

GodSpeed

Fast and intuitive manager for multiple reverse shells
Go
82
star
17

UnChain

A tool to find redirection chains in multiple URLs
Go
78
star
18

meducat

Combinations of default usernames and passwords for the Medusa and Hashcat password cracker
67
star
19

REVENANT

Volatile ELF payloads generator with Metasploit integrations for testing GNU/Linux ecosystems
C
53
star
20

Solaris

A local LKM rootkit loader/dropper that lists available security mechanisms
Go
52
star
21

Svetovid

A bunch of post exploitation tools + reverse proxy server
Shell
46
star
22

pentest-cheatsh-it

Pentesting cheatsheet
30
star
23

RedSand

Windows SandBox environment for cybersecurity enthusiasts
PowerShell
28
star
24

poXSSon

A framework for easy payloads development and deployment, collection of customizable XSS payloads
Python
26
star
25

Penthon

Useful python functions for pentesting, networking, data conversion and automation
Python
18
star
26

POWERPROMPT

A colorful, informative prompt for Zsh
Shell
16
star
27

RedHash

Medusa combo files, Hashcat rules and dictionaries, JRT rules
12
star
28

RedMark

Our fork of Iceman's fork for Proxmark III
C
12
star
29

LLT

Shellcoding scripts and utilities
Perl
8
star
30

word-processing-rules

Rules for Hashcat, HCRE and JTR
7
star
31

talks

slides from talks of our members
6
star