-
Notifications
You must be signed in to change notification settings - Fork 0
/
README.txt
95 lines (70 loc) · 3.18 KB
/
README.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
Aircrack-CLI - Command Line Interface
=====================================
Version:
--------
1.2.5 (2015-01-24)
See ChangeLog for details.
TODO:
BUGS:
Description:
------------
Basic simplified command line interface for Aircrack-ng (credits to Thomas d'Otreppe <[email protected]>).
Official documentation and tutorials of Aircrack-ng can be found on http://www.aircrack-ng.org, see also manpages and the forum.
List of features:
- start/stop monitor interfaces (promiscuous mode) on selected wireless interface and transmission channels (use of "airmon-ng")
- capture of WPA/WPA2 handshakes of the selected Access Point (use of "airodump-ng")
- crack WEP keys: use fake authentications and ARP request replay to generate new unique IVs, then used to crack the WEP key
- start single or multiple deauthentications on provided clients forcing them to reauthenticate, to capture WPA/WPA2 handshakes (use of "aireplay-ng")
- Wifi Jammer (AirJammer): jamming on chosen wireless network sending disassociate packets to list of clients or in broadcast mode, optimized for multi-thread execution. Useful to capture WPA/WPA2 handshakes or jam a wireless network
- install requested system dependencies to run this program and Aircrack-ng suite
- download, compile and install Aircrack-ng source code from official website
- capable to run multiple instances of Aircrack-cli and all subsequent operations
- automatic recognition of: OS, network manager in use and wireless interface to use
- start/stop network manager if requested by user, to avoid conflicts with monitor interfaces
- online version checks
- Reaver: capable to launch brute force attack against Wifi Protected Setup (WPS), using Reaver (visit: https://code.google.com/p/reaver-wps/ , all credits go to project's creators)
Installation:
-------------
Compatible with Linux ONLY!
System requirements (automatic install provided):
* build-essential ('make' and 'gcc')
* xterm
* wget
* macchanger
For compiling and installing Aircrack-ng and Reaver-WPS:
* libssl-dev/openssl-devel
* libnl-3-dev/libnl3-devel
* libnl-genl-3-dev/libnl-genl3-devel
* libpcap0.8(-dev)
* libsqlite3-0(-dev)
* pkg-config
- Compile:
`make`
- Then install:
`sudo make install`
- Remove build files:
`make clean`
- Uninstall:
`make uninstall`
Usage:
------
If launching from source folder:
$ sudo ./bin/aircrack-cli.bin [N] [WLAN-IF]
Or if it was installed to system path:
$ sudo aircrack-cli.bin [N] [WLAN-IF]
Optional parameters:
[N] skips installation of dependencies
[WLAN-IF] specifies wireless interface (if different from system default)
Notes:
------
Reaver-WPS seems to be not working with the new version of libpcap & libpcap-dev, probably for some incompatibility or some bugs.
You can downgrade them to version 1.4.0-2 with the provided packages (debian-like) under "util" or downloading from here:
http://mirrors.kernel.org/ubuntu/pool/main/libp/libpcap/
Other packages may be found in software resources of each distro.
(Source: https://code.google.com/p/reaver-wps/issues/detail?id=217#c19)
License:
--------
GPLv2, see LICENSE.md
Author:
-------
ynad (github.com/ynad/aircrack-cli)