GithubHelp home page GithubHelp logo

hash3lizer / wifibroot Goto Github PK

View Code? Open in Web Editor NEW
924.0 46.0 178.0 604 KB

A Wireless (WPA/WPA2) Pentest/Cracking tool. Captures & Crack 4-way handshake and PMKID key. Also, supports a deauthentication/jammer mode for stress testing

License: GNU General Public License v3.0

Python 100.00%
wpa2 pmkid wpa2-cracker scapy wireless-penetration-testing handshake eapol hashcat aircrack python27

wifibroot's Introduction

WiFiBroot

A Wireless Pentest/Cracking Tool for 4-way Handshake & PMKID

DESCRIPTION

WiFiBroot is built to provide clients all-in-one facility for cracking WiFi (WPA/WPA2) networks. It heavily depends on scapy, a well-featured packet manipulation library in Python. Almost every process within is dependent somehow on scapy layers and other functions except for operating the wireless interface on a different channel. That will be done via native linux command iwconfig for which you maybe need sudo privileges. It currently provides four independent working modes to deal with the target networks. Two of them are online cracking methods while the other runs in offline mode. The offline mode is provided to crack saved hashes from the first two modes. One is for deauthentication attack on wireless network and can also be used as a jamming handler. It can be run on a variety of linux platforms and atleast requires WN727N from tp-link to properly operate.

Installation:

It only works with Python 2

WiFiBroot heavily depends on scapy. So, you would need scapy installed. Almost, every other library would likely be installed on your system. Make sure the version you install for scapy should be <=2.4.0. Newer versions are likely to throw some unknown errors.

$ sudo pip install scapy==2.4.0

The script is supposed to be run under sudo but it will still work even if not run under the root mode. The basic necessary arguments are:

$ sudo python wifibroot.py -i [interface] -d /path/to/dictionary -m [mode]

Documentation :

WiFiBroot uses modes to identify which attack you want to perform on your target. Currently, there are three available modes. The usage of each mode can be seen by supplying the --help/-h option right after the -m/--mode option. Here's a list of available modes and what they do:

Modes:

Syntax:
    $ python wifibroot.py [--mode [modes]] [--options]
    $ python wifibroot.py --mode 2 -i wlan1mon --verbose -d /path/to/list -w pmkid.txt

Modes:
    #     Description                                 Value
    01    Capture 4-way handshake and crack MIC code    1
    02    Captures and Crack PMKID (PMKID Attack)       2
    03    Perform Manual cracking on available
          capture types. See --list-types               3
    04    Deauthentication. Disconnect two stations
          and jam the traffic.                          4

Use -h, --help after -m, --mode to get help on modes. 

Each mode has a specific purpose and has it's own options:

HANDSHAKE:

Mode: 
   01      Capture 4-way handshake and crack MIC code    1

Options:
   Args               Description                      Required
   -h, --help         Show this help manual              NO
   -i, --interface    Monitor Interface to use           YES
   -v, --verbose      Turn off Verbose mode.             NO
   -t, --timeout      Time Delay between two deauth
                      requests.                          NO
   -d, --dictionary   Dictionary for Cracking            YES
   -w, --write        Write Captured handshake to
                      a seperate file                    NO
       --deauth       Number of Deauthentication
                      frames to send                     NO 

Filters: 
   -e, --essid         ESSID of listening network
   -b, --bssid         BSSID of target network.
   -c, --channel       Channel interface should be listening
                       on. Default: ALL

PMKID ATTACK

Mode: 
   02      Captures and Crack PMKID (PMKID Attack)       1

Options:
   Args               Description                      Required
   -h, --help         Show this help manual              NO
   -i, --interface    Monitor Interface to use           YES
   -v, --verbose      Turn off Verbose mode.             NO
   -d, --dictionary   Dictionary for Cracking            YES
   -w, --write        Write Captured handshake to
                      a seperate file                    NO

Filters: 
   -e, --essid         ESSID of listening network
   -b, --bssid         BSSID of target network.
   -c, --channel       Channel interface should be listening
                       on. Default: ALL

Offline Cracking

Mode: 
   03    Perform Manaul cracking on available capture
         types. See --list-types                         3

Options:
   Args               Description                      Required 
   -h, --help         Show this help manual              NO
       --list-types   List available cracking types      NO
       --type         Type of capture to crack           YES
   -v, --verbose      Turn off Verbose mode.             NO
   -d, --dictionary   Dictionary for Cracking            YES
   -e, --essid        ESSID of target network. 
                      Only for HANDSHAKE Type            YES
   -r, --read         Captured file to crack             YES

DEAUTHENTICATION ATTACK (Stress Testing)

Mode:
    04   Deauthentication. Disconnect two stations
         and jam the traffic.                            4

Options:
    Args              Description                      Required
    -h, --help        Show this help manual              NO
    -i, --interface   Monitor Mode Interface to use      YES
    -0, --count       Number of Deauthentication
                      frames to send. '0' specifies
                      unlimited frames                   YES
        --ap          Access Point MAC Address           NO
        --client      STA (Station) MAC Address          NO

Examples

To Capture 4-way handshake and crack MIC code:

$ python wifibroot.py --mode 1 -i wlan1mon --verbose -d dicts/list.txt -w output.cap 

To Capture and Crack PMKID:

$ python wifibroot.py --mode 2 -i wlan1mon --verbose -d dicts/list.txt -w output.txt

Offline Crack Handshake and PMKID:

$ python wifibroot.py --mode 3 --type handshake --essid "TARGET ESSID" --verbose -d dicts/list.txt --read output.cap
$ python wifibroot.py --mode 3 --type pmkid --verbose -d dicts/list.txt --read output.txt

Deauthentication attack in various form:

# Ultimate Deauthentication attack: 
$ python wifibroot.py --mode 4 -i wlan1mon -00 --verbose
# Disconnect All Clients from Acess Point:
$ python wifibroot.py --mode 4 -i wlan1mon --ap [AP MAC] --verbose
# Disconnect a Specific Client: 
$ python wifibroot.py --mode 4 -i wlan1mon --ap [AP MAC] --client [STA MAC] --verbose

Support

Website: https://www.shelvoide.com
Twitter: @hash3liZer
Email: [email protected]

wifibroot's People

Contributors

cclauss avatar hash3lizer avatar mirfansulaiman avatar pdelteil avatar prodject avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

wifibroot's Issues

Feature Option?

So many wifi tools that include the PMKID attack always have built in cracking options.. but never have the options to just output the capture file itself for manipulating later with tools like hashcat, which is always the better approach. Especially if you're using a low powered device for scanning and isn't really capable of achieving much CPU calculation wise.

Would you be interested in possibly adding an option under the PMKID for saving any valid PMKID's found into a file for later conversion with a tool such as hcxpcaptool?

Client is showing 0

hi , scanning produces 0 clients. Tested with my own network with few devices connected but scanning shows 0 clients. If
AP Clients [0] Scan Further?[Y/n] Y , this option is taking too long to scan.

wifibroot import errors

Hello, i followed the instructions/documentation and when trying to run wifibroot i am getting ImportErrors:
Traceback (most recent call last):
File "wifibroot.py", line 19, in
from wireless import Shifter
File "/usr/local/bin/WiFiBroot/wireless/init.py", line 3, in
from wireless.cracker import PSK
File "/usr/local/bin/WiFiBroot/wireless/cracker.py", line 6, in
from pbkdf2 import PBKDF2
ImportError: No module named pbkdf2

I don't know much about python so it might be due to "from wireless ..." being a folder and not a file. I wanted to see if there are any other errors so i tried to replace all files in the same directory and edit the wifibroot.py and exclude the missing files/classes like:
psk, eAPoL, pmkid, capture_pmkid, capture_hand, deauth
Excluding these wifibroot will "run" without errors, but surely will make it not functioning

I am running the newest kali linux with scapy 2.4.0 and tried python, python2, python2.7, python3, python3.7. Running it on python3 versions will result in SyntaxError at line 197

I hope you can help.
Thanks in advance

Unuseful frames should not be stored

Unuseful or disregarded frames should not be stored in memory and disregarded. If i'm doing a handshake attack, it shouldn't eat 16GB of swap for 4 frames listed on-screen after 8 hours of constant attack.

Issue when running initial AP scan

I have done everything I can think of in order to fix this issues and could really use some assistance. When I run:
python wifibroot.py -i wlan0 --dictionary wordlist.txt -m 1

(note: I have tried to run the program every single way recommended by other guides as well)

I get the following results:

NO ESSID PWR ENC CIPHER AUTH CH BSSID


1 *********** -48 WPA2 CCMP PSK 1 :::::
Exception in thread Verbose Sniffer:
Traceback (most recent call last):
File "/usr/lib/python2.7/threading.py", line 801, in __bootstrap_inner
self.run()
File "/usr/lib/python2.7/threading.py", line 754, in run
self.__target(*self.__args, **self.kwargs)
File "/root/WiFiBroot/screen.py", line 83, in Shifter
self.screen.addstr(1, 0, "\n"+tabulate(tabulator
, headers=__HEADERS)+"\n")
TypeError: int,int,str

                                                                                                                                       [?] Enter Your Target Number [q]uit/[n]: 

I should also mention that the terminal is frozen at this point and I have to completely close it out. Sometimes I won't get any APs before the error occurs and other times I will get 2 with the error immediately following.

Please help!

Thnks!

Error: "ImportError: No module named scapy.utils"

Hello,
I get prompted with this error when using 'python2':

Traceback (most recent call last):
  File "wifibroot.py", line 17, in <module>
    from screen import Display
  File "/home/davinci/tools/WiFiBroot/screen.py", line 2, in <module>
    from scapy.utils import hexdump
ImportError: No module named scapy.utils

Exception in thread Verbose Sniffer: ERROR

first thanks for making such great powerful tool , this shows how smart you are.
I am so sad that I can't scan my networks though 😢

I already tried what you said -e or -bssid 2WIREWIFIname
that Doesn't show any wifi at all keeps hoping on channels only

here is the code I get `RIS 1
Exception in thread Verbose Sniffer:
Traceback (most recent call last):
File "/usr/lib/python2.7/threading.py", line 801, in __bootstrap_inner
self.run()
File "/usr/lib/python2.7/threading.py", line 754, in run
self.__target(*self.__args, **self.kwargs)
File "/root/WiFiBroot/screen.py", line 83, in Shifter
self.screen.addstr(1, 0, "\n"+tabulate(tabulator
, headers=__HEADERS)+"\n")
TypeError: int,int,str

`
i can't post an image here is a link

https://i.imgur.com/gQ54dTM.png

EAPOL AttributeError

I get this after a few Association Requests
[*] Waiting For EAPOL to initate...
Exception in thread Association Depender:
Traceback (most recent call last):
File "/usr/lib/python2.7/threading.py", line 801, in __bootstrap_inner
self.run()
File "/usr/lib/python2.7/threading.py", line 754, in run
self.__target(*self.__args, **self.__kwargs)
File "/root/WiFiBroot/wireless/pmkid.py", line 143, in asso_sniffer
sniff(iface=iface, prn=self.get_asso_resp)
File "/usr/local/lib/python2.7/dist-packages/scapy/sendrecv.py", line 620, in sniff
r = prn(p)
File "/root/WiFiBroot/wireless/pmkid.py", line 163, in get_asso_resp
nonce = binascii.hexlify(pkt.getlayer(Raw).load)[26:90]
AttributeError: 'NoneType' object has no attribute 'load'

[^] 1 Frames 843A4B66DB70 > 5E4979CE1679 [Association Request]
Then it goes on and comes again

EAPOL

ImportError: Cannot import name EAPOL

self screen error

when i start wifibroot, appear like this

10 SSID -85 WPA2/WPA TKIP PSK 3 34:0A File "/usr/lib/python2.7/threading.py", line 801, in __bootstrap_inner
11 self.run()A -85 WPA2 TKIP PSK 1 5X:XX:XX:XX:00:XX Huawei 0
File "/usr/lib/python2.7/threading.py", line 754, in run
self.__target(*self.__args, **self.kwargs)
File "/home/h/WiFiBroot/screen.py", line 83, in Shifter
self.screen.addstr(1, 0, "\n"+tabulate(tabulator
, headers=__HEADERS)+"\n")
TypeError: int,int,str

total beginner question

hey great tool, I'm currently learning how to code and I just want better internet so I have no time to learn about networks right now, so as far as I know, I need to install Linux OS and a network adapter, right ??

issue

python wifibroot.py -i wlan1
Traceback (most recent call last):
File "wifibroot.py", line 18, in
from wireless import Shifter
File "/root/Desktop/newtools/WiFiBroot/wireless/init.py", line 3, in
from wireless.cracker import PSK
File "/root/Desktop/newtools/WiFiBroot/wireless/cracker.py", line 6, in
from pbkdf2 import PBKDF2
ImportError: No module named pbkdf2

cannot use

File "/data/data/com.termux/files/home/WiFiBroot/wifibroot.py", line 197
print "\n"+tabulate(tabulator__, headers=__HEADERS)+"\n"
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
SyntaxError: Missing parentheses in call to 'print'. Did you mean print(...)?

Dont work under scapy-2.4.2

Traceback (most recent call last):
File "wifibroot.py", line 19, in
from wireless import Shifter
File "/usr/share/wifibroot/wireless/init.py", line 2, in
from wireless.sniper import Sniper
File "/usr/share/wifibroot/wireless/sniper.py", line 7, in
from scapy.layers.dot11 import Raw
ImportError: cannot import name Raw

WiFiBroot doesn't boot in Kali Linux (most recent release and update)

I am running Kali under VM ware. Kali has been updated and I have installed the most recent scapy. I even attempted old fixes under the issues area.
I've also ensured I had the other dependency I could find.
apt-get install python-pbkdf2

I did a gitclone to WiFiBroot-1.3 and have the same results.

This is the feedback I get from each boot

root@tehbear:~/WiFiBroot# python wifibroot.py -h
Traceback (most recent call last):
File "wifibroot.py", line 20, in
from wireless import Shifter
File "/root/WiFiBroot/wireless/init.py", line 2, in
from wireless.sniper import Sniper
File "/root/WiFiBroot/wireless/sniper.py", line 7, in
from scapy.layers.dot11 import Raw
ImportError: cannot import name Raw

How do I fix this? I have had this on other installations of Kali, I just don't know why it doesn't work now.

No buffer space available

Exception in thread T Shooter:
Traceback (most recent call last):
File "/usr/lib/python2.7/threading.py", line 801, in __bootstrap_inner
self.run()
File "/usr/lib/python2.7/threading.py", line 754, in run
self.__target(*self.__args, **self.__kwargs)
File "/root/WiFiBroot/wireless/sniper.py", line 181, in shoot
sendp(__pkt_to_cl, iface=self.iface, count=1, verbose=False)
File "/usr/lib/python2.7/dist-packages/scapy/sendrecv.py", line 315, in sendp
verbose=verbose, realtime=realtime, return_packets=return_packets)
File "/usr/lib/python2.7/dist-packages/scapy/sendrecv.py", line 276, in __gen_send
s.send(p)
File "/usr/lib/python2.7/dist-packages/scapy/arch/linux.py", line 551, in send
return SuperSocket.send(self, x)
File "/usr/lib/python2.7/dist-packages/scapy/supersocket.py", line 45, in send
return self.outs.send(sx)
error: [Errno 105] No buffer space available

[^] 32-> 240A64E75E3E (AzureWave) >< F81897824E61 (2Wire,) [Deauthentication]
Exception in thread T Shooter:
Traceback (most recent call last):
File "/usr/lib/python2.7/threading.py", line 801, in __bootstrap_inner
self.run()
File "/usr/lib/python2.7/threading.py", line 754, in run
self.__target(*self.__args, **self.__kwargs)
File "/root/WiFiBroot/wireless/sniper.py", line 181, in shoot
sendp(__pkt_to_cl, iface=self.iface, count=1, verbose=False)
File "/usr/lib/python2.7/dist-packages/scapy/sendrecv.py", line 315, in sendp
verbose=verbose, realtime=realtime, return_packets=return_packets)
File "/usr/lib/python2.7/dist-packages/scapy/sendrecv.py", line 276, in __gen_send
s.send(p)
File "/usr/lib/python2.7/dist-packages/scapy/arch/linux.py", line 551, in send
return SuperSocket.send(self, x)
File "/usr/lib/python2.7/dist-packages/scapy/supersocket.py", line 45, in send
return self.outs.send(sx)
error: [Errno 105] No buffer space available

Python 3 compatibility issues

flake8 testing of https://github.com/hash3liZer/WiFiBroot on Python 3.7.1

$ flake8 . --count --select=E9,F63,F7,F82 --show-source --statistics

./wifibroot.py:197:12: E999 SyntaxError: invalid syntax
		print "\n"+tabulate(tabulator__, headers=__HEADERS)+"\n"
           ^
./pull.py:161:20: E999 SyntaxError: invalid syntax
		print "%s[*]%s %s" % (self.BOLD+self.YELLOW, self.END, statement)
                   ^
./wireless/shifter.py:153:59: E999 SyntaxError: invalid syntax
		if pkt.haslayer(Dot11) and pkt.getlayer(Dot11).type == 2L and not pkt.haslayer(EAPOL):
                                                          ^
./wireless/cracker.py:167:12: F821 undefined name 'xrange'
		for c in xrange(0, len(src), length):
           ^
./wireless/captures.py:176:41: E999 SyntaxError: invalid syntax
				self.pull.right("PMK =>"); print self.hexdump(_pmk)
                                        ^
./wireless/sniper.py:63:59: E999 SyntaxError: invalid syntax
		if pkt.haslayer(Dot11) and pkt.getlayer(Dot11).type == 2L and not pkt.haslayer(EAPOL):
                                                          ^
./wireless/connector.py:51:21: E999 SyntaxError: invalid syntax
		except ImportError, e:
                    ^
./wireless/pmkid.py:162:19: E999 SyntaxError: invalid syntax
		except Exception, e:
                  ^
./utils/tabulater__.py:19:18: F821 undefined name 'long'
    _long_type = long
                 ^
./utils/tabulater__.py:21:18: F821 undefined name 'unicode'
    _text_type = unicode
                 ^
./utils/tabulater__.py:25:30: F821 undefined name 'file'
        return isinstance(f, file)
                             ^
7     E999 SyntaxError: invalid syntax
4     F821 undefined name 'long'
11

E901,E999,F821,F822,F823 are the "showstopper" flake8 issues that can halt the runtime with a SyntaxError, NameError, etc. These 5 are different from most other flake8 issues which are merely "style violations" -- useful for readability but they do not effect runtime safety.

  • F821: undefined name name
  • F822: undefined name name in __all__
  • F823: local variable name referenced before assignment
  • E901: SyntaxError or IndentationError
  • E999: SyntaxError -- failed to compile a file into an Abstract Syntax Tree

how to fix this ??

root@a-Inspiron-M5040:/home/a/Downloads/WiFiBroot-master# python3 wifibroot.py -m 2 -i wlan0mon --verbose -d dicts/list.txt -w output.txt


\ _ /*_*__\/ \ / \___
\ \ \\ \\ /\ ) \ ) \
__\
\\ \\ \ / ___/ __\

      v1.0. Coded by @hash3liZer.

[*] Path: {dicts/list.txt} Lines {41}
Traceback (most recent call last):
File "wifibroot.py", line 607, in
main()
File "wifibroot.py", line 576, in main
iface = _channeler(options); _silf = _silfer(iface, options)
File "wifibroot.py", line 464, in _channeler
iface = interface(options.interface)
File "wifibroot.py", line 51, in init
self.check_man = self.check_man()
File "wifibroot.py", line 56, in check_man
if self.is_man(self.iface):
File "wifibroot.py", line 103, in is_man
card = re.findall('Mode:[A-Za-z]+', data)[0]
File "/usr/lib/python3.6/re.py", line 222, in findall
return _compile(pattern, flags).findall(string)
TypeError: cannot use a string pattern on a bytes-like object

Syntax error

File "/data/data/com.termux/files/home/WiFiBroot/wifibroot.py", line 197
print "\n"+tabulate(tabulator__, headers=__HEADERS)+"\n"
^
SyntaxError: invalid syntax

ImportError: No module named pbkdf2 on debian buster

i've cloned the repo, installed scapy with the required version, did everything right, but when i run wifibroot.py it logs this error:

Traceback (most recent call last):
  File "wifibroot.py", line 19, in <module>
    from wireless import Shifter
  File "/home/<username>/WiFiBroot/wireless/__init__.py", line 3, in <module>
    from wireless.cracker import PSK
  File "/home/<username>/WiFiBroot/wireless/cracker.py", line 6, in <module>
    from pbkdf2 import PBKDF2
ImportError: No module named pbkdf2

Hidden essid causes a crash in screen.py

Hello,

During network scanning, I had a systematic crash in screen.py:

Exception in thread Verbose Sniffer:
Traceback (most recent call last):
File "/usr/lib/python2.7/threading.py", line 801, in __bootstrap_inner                                                                                
self.run()
File "/usr/lib/python2.7/threading.py", line 754, in run
self.__target(*self.__args, **self.__kwargs)
File "/home/WiFiBroot/screen.py", line 82, in Shifter
self.screen.addstr(1, 0, "\n"+tabulate(tabulator__, headers=__HEADERS)+"\n")
TypeError: int,int,str

Some of my AP do not boardcast their ESSID and I think it caused this issue.

I edited the code to add a basic print in screen.Shifter function:

for ap in self.__WiFiAP:
	if self.verbose:
		tabulator__.append([ap['count'], ap['essid'], ap['pwr'], ap['auth'], ap['cipher'], \
				ap['psk'], ap['channel'], ap['bssid'].upper(), ap['vendor'], ap['clients']])
	else:
		tabulator__.append([ap['count'], ap['essid'], ap['pwr'], ap['auth'], ap['cipher'], \
				ap['psk'], ap['channel'], ap['bssid'].upper()])
print(tabulator__)
self.screen.addstr(0, 0, "[%s] Channel [%s] Time Elapsed [%d] Networks Found"\
						% (self.cch(iface_instance.cch), self.c_time(), len(tabulator__)))
self.screen.addstr(1, 0, "\n"+tabulate(tabulator__, headers=__HEADERS)+"\n")
self.screen.refresh()

Here the last 2 prints just before TypeError:

[[1, u'NETGEAR', -24, u'WPA2', u'CCMP', u'PSK', u'9', u'3C:37:86:97:XX:XX', u'unknown', 0], [2, u'land', -61, u'WPA', u'TKIP', u'PSK', u'6', u'44:CE:7D:7A:XX:XX', u'unknown', 2], [3, u'WiFi FON', -78, u'OPEN', u'', u'', u'1', u'BA:7E:CB:64:XX:XX', u'unknown', 0], [4, u'WiFi Mobile', -79, u'WPA2', u'CCMP', u'MGT', u'1', u'BA:7E:CB:64:XX:XX', u'unknown', 0], [5, u'7F70', -80, u'WPA', u'TKIP', u'PSK', u'1', u'30:7E:CB:64:XX:XX', u'unknown', 0], [6, u'SFR_80A0', -84, u'WPA2/WPA', u'TKIP', u'PSK', u'11', u'E0:A1:D7:45:XX:XX', u'unknown', 0], [7, u'WiFi FON', -84, u'OPEN', u'', u'', u'11', u'D2:A1:D7:45:XX:XX', u'unknown', 0], [8, u'WiFi Mobile', -84, u'WPA2', u'CCMP', u'MGT', u'11', u'D2:A1:D7:45:XX:XX', u'unknown', 0]]
[[1, u'NETGEAR', -24, u'WPA2', u'CCMP', u'PSK', u'9', u'3C:37:86:97:XX:XX', u'unknown', 0], [2, u'land', -61, u'WPA', u'TKIP', u'PSK', u'6', u'44:CE:7D:7A:XX:XX', u'unknown', 2], [3, u'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', -64, u'WPA2', u'CCMP', u'PSK', u'6', u'FE:65:DE:B6:XX:XX', u'unknown', 0], [4, u'WiFi FON', -78, u'OPEN', u'', u'', u'1', u'BA:7E:CB:64:XX:XX', u'unknown', 0], [5, u'WiFi Mobile', -79, u'WPA2', u'CCMP', u'MGT', u'1', u'BA:7E:CB:64:XX:XX', u'unknown', 0], [6, u'7F70', -80, u'WPA', u'TKIP', u'PSK', u'1', u'30:7E:CB:64:XX:XX', u'unknown', 0], [7, u'SFR_80A0', -84, u'WPA2/WPA', u'TKIP', u'PSK', u'11', u'E0:A1:D7:45:XX:XX', u'SFR', 0], [8, u'WiFi FON', -84, u'OPEN', u'', u'', u'11', u'D2:A1:D7:45:XX:XX', u'unknown', 0], [9, u'WiFi Mobile', -84, u'WPA2', u'CCMP', u'MGT', u'11', u'D2:A1:D7:45:XX:XX', u'unknown', 0]]

Noticed the apparition of this value in the last iteration:
u'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'

I just added a condition to grep this string in ap['essid'] and set it to ' ', everything worked fine after that.

OSError: [Errno 2] No such file or directory

Hi,
I'm running WifiBroot in Debian 10 Buster , had to install pip2 as it has been deprecated. I've followed along the installation guide and I have that error, you can see the full verbose output below.
What am I missing? Couldn't really tell by duckducking the error, or by previous knowledge how to sort this

$ python2 ./wifibroot.py -m 2 -i wlan0mon -d /home/fakuve/programs/WiFiBroot/dicts/list.txt --verbose


[*] Path: {/home/fakuve/programs/WiFiBroot/dicts/list.txt} Lines {41}
Traceback (most recent call last):
  File "./wifibroot.py", line 609, in <module>
    main()
  File "./wifibroot.py", line 575, in main
    iface = _channeler(options); _silf = _silfer(iface, options)
  File "./wifibroot.py", line 463, in _channeler
    iface = interface(options.interface)
  File "./wifibroot.py", line 50, in __init__
    self.check_man = self.check_man()
  File "./wifibroot.py", line 55, in check_man
    if self.is_man(self.iface):
  File "./wifibroot.py", line 100, in is_man
    co = subprocess.Popen(['iwconfig', iface], stdout=subprocess.PIPE)
  File "/usr/lib/python2.7/subprocess.py", line 394, in __init__
    errread, errwrite)
  File "/usr/lib/python2.7/subprocess.py", line 1047, in _execute_child
    raise child_exception
OSError: [Errno 2] No such file or directory

Thanks

ImportError: No module named scapy.all

python wifibroot.py --mode 2 -i wlan1mon --verbose -d handshakes -w pmkid.txt 127 ⨯
Traceback (most recent call last):
File "wifibroot.py", line 17, in
from screen import Display
File "/home/asus/WiFiBroot/screen.py", line 2, in
from scapy.all import *
ImportError: No module named scapy.all

I use kali

Set Frequency" (8B04)

hello during scan , getting this error:

Error for wireless request "Set Frequency" (8B04) :
SET failed on device wlan1mon ; Invalid argument.

A WPA 2 karma attack (saved network handshaker )

as karma attacks works on saved open networks only and not secured ones so we will need to have the password first to get it work although this seems a bit hard... the number of saved networks Guarantee that there is a one with a weak password... so will need to make the karma attack start two networks of the targeted prob one open and the second secured and the victim will auto connect to the one with the correct configuration with the saved obviously correct password and we save that handshake with the other handshakes captured form the same device to brute force and break the ones with the weak passwords.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.