Friday 28 August 2020

Airba.sh - A POSIX-compliant, Fully Automated WPA PSK Handshake Capture Script Aimed At Penetration Testing



Airbash is a POSIX-compliant, fully automated WPA PSK handshake capture script aimed at penetration testing. It is compatible with Bash and Android Shell (tested on Kali Linux and Cyanogenmod 10.2) and uses aircrack-ng to scan for clients that are currently connected to access points (AP). Those clients are then deauthenticated in order to capture the handshake when attempting to reconnect to the AP. Verification of a captured handshake is done using aircrack-ng. If one or more handshakes are captured, they are entered into an SQLite3 database, along with the time of capture and current GPS data (if properly configured).
After capture, the database can be tested for vulnerable router models using crackdefault.sh. It will search for entries that match the implemented modules, which currently include algorithms to compute default keys for Speedport 500-700 series, Thomson/SpeedTouch and UPC 7 digits (UPC1234567) routers.

Requirements
WiFi interface in monitor mode aircrack-ng SQLite3 openssl for compilation of modules (optional) wlanhc2hcx from hcxtools
In order to log GPS coordinates of handshakes, configure your coordinate logging software to log to .loc/*.txt (the filename can be chosen as desired). Airbash will always use the output of cat "$path$loc"*.txt 2>/dev/null | awk 'NR==0; END{print}', which equals to reading all .txt files in .loc/ and picking the second line. The reason for this way of implementation is the functionality of GPSLogger, which was used on the development device.

Calculating default keys
After capturing a new handshake, the database can be queried for vulnerable router models. If a module applies, the default keys for this router series are calculated and used as input for aircrack-ng to try and recover the passphrase.

Compiling Modules
The modules for calculating Thomson/SpeedTouch and UPC1234567 (7 random digits) default keys are included in src/
Credits for the code go to the authors Kevin Devine and [peter@haxx.in].
On Linux:
gcc -fomit-frame-pointer -O3 -funroll-all-loops -o modules/st modules/stkeys.c -lcrypto
gcc -O2 -o modules/upckeys modules/upc_keys.c -lcrypto
If on Android, you may need to copy the binaries to /system/xbin/ or to another directory where binary execution is allowed.

Usage
Running install.sh will create the database, prepare the folder structure and create shortlinks to both scripts which can be moved to a directory that is on $PATH to allow execution from any location.
After installation, you may need to manually adjust INTERFACE on line 46 in airba.sh. This will later be determined automatically, but for now the default is set to wlan0, to allow out of the box compatibility with bcmon on Android.
./airba.sh starts the script, automatically scanning and attacking targets that are not found in the database. ./crackdefault.sh attempts to break known default key algorithms.
To view the database contents, run sqlite3 .db.sqlite3 "SELECT * FROM hs" in the main directory.

Update (Linux only ... for now):
Airbash can be updated by executing update.sh. This will clone the master branch into /tmp/ and overwrite the local files.

Output
_n: number of access points found
__c/m: represents client number and maximum number of clients found, respectively
-: access point is blacklisted
x: access point already in database
?: access point out of range (not visible to airodump anymore)

The Database
The database contains a table called hs with seven columns.
id: incrementing counter of table entries
lat and lon: GPS coordinates of the handshake (if available)
bssid: MAC address of the access point
essid: Name identifier
psk: WPA Passphrase, if known
prcsd: Flag that gets set by crackdefault.sh to prevent duplicate calculation of default keys if a custom passphrase was used.
Currently, the SQLite3 database is not password-protected.


Continue reading


  1. Hacking Tools 2019
  2. Hacker Tools Mac
  3. Hack Tools Mac
  4. Hack Tools Pc
  5. Hacking Tools Usb
  6. Hack Tools Online
  7. How To Make Hacking Tools
  8. Pentest Tools Port Scanner
  9. Hack Tools 2019
  10. Growth Hacker Tools
  11. Hacker Tools Github
  12. Hacker Tools For Mac
  13. Pentest Tools Linux
  14. Pentest Tools
  15. Pentest Tools List
  16. Pentest Tools Free
  17. Tools 4 Hack
  18. Pentest Tools Open Source
  19. Pentest Tools Subdomain
  20. Hacking Tools And Software
  21. Pentest Tools Linux
  22. How To Hack
  23. Kik Hack Tools
  24. Computer Hacker
  25. Hacker Tools Apk Download
  26. Hacking Tools For Games
  27. Pentest Tools Tcp Port Scanner
  28. Android Hack Tools Github
  29. Hack Tools Pc
  30. Tools Used For Hacking
  31. Wifi Hacker Tools For Windows
  32. Hacker Search Tools
  33. Hacking Tools For Windows
  34. Hacker Tools Windows
  35. Hack Tools Online
  36. Tools For Hacker
  37. Hacker Tool Kit
  38. Hacker Tools For Mac
  39. Hacking Tools For Mac
  40. Game Hacking
  41. Hacking Tools Name
  42. Hacking Tools For Windows
  43. Wifi Hacker Tools For Windows
  44. Hacking Tools Mac
  45. Hack Tool Apk
  46. Pentest Recon Tools
  47. Hacker Tools Linux
  48. Hacking Tools For Mac
  49. Hacker Tool Kit
  50. Hacker Tools
  51. Pentest Tools For Ubuntu
  52. Hack Tools
  53. How To Install Pentest Tools In Ubuntu
  54. Hacking Tools Online
  55. Hack Tools For Pc
  56. Hacker Tool Kit
  57. Hacking Tools 2019
  58. Hacker Tools Hardware
  59. Hacker Tools Hardware
  60. Install Pentest Tools Ubuntu
  61. Hack Tools Github
  62. Easy Hack Tools
  63. Hacking Tools Online
  64. Hacker Tools 2019
  65. Hack Tools Download
  66. Hacking Tools Free Download
  67. Hack Tools Mac
  68. What Is Hacking Tools
  69. What Are Hacking Tools
  70. Hack Tools For Mac
  71. Hacking Tools 2020
  72. Hack Tools Online
  73. Physical Pentest Tools
  74. Hacker Security Tools
  75. Hack Tools For Ubuntu
  76. Game Hacking
  77. How To Make Hacking Tools
  78. Hacker Tools Free Download
  79. Hacker Tools Free Download
  80. Tools 4 Hack
  81. Hack Tools For Windows
  82. Pentest Tools Download
  83. Hacker Hardware Tools
  84. How To Install Pentest Tools In Ubuntu
  85. Hacking Tools Usb
  86. Hacking Tools Software
  87. Hack Tools For Ubuntu
  88. Hacker Tools Free
  89. Hack Tools

No comments: