Friday, August 21, 2020

Airba.sh - A POSIX-compliant, Fully Automated WPA PSK Handshake Capture Script Aimed At Penetration Testing



Airbash is a POSIX-compliant, fully automated WPA PSK handshake capture script aimed at penetration testing. It is compatible with Bash and Android Shell (tested on Kali Linux and Cyanogenmod 10.2) and uses aircrack-ng to scan for clients that are currently connected to access points (AP). Those clients are then deauthenticated in order to capture the handshake when attempting to reconnect to the AP. Verification of a captured handshake is done using aircrack-ng. If one or more handshakes are captured, they are entered into an SQLite3 database, along with the time of capture and current GPS data (if properly configured).
After capture, the database can be tested for vulnerable router models using crackdefault.sh. It will search for entries that match the implemented modules, which currently include algorithms to compute default keys for Speedport 500-700 series, Thomson/SpeedTouch and UPC 7 digits (UPC1234567) routers.

Requirements
WiFi interface in monitor mode aircrack-ng SQLite3 openssl for compilation of modules (optional) wlanhc2hcx from hcxtools
In order to log GPS coordinates of handshakes, configure your coordinate logging software to log to .loc/*.txt (the filename can be chosen as desired). Airbash will always use the output of cat "$path$loc"*.txt 2>/dev/null | awk 'NR==0; END{print}', which equals to reading all .txt files in .loc/ and picking the second line. The reason for this way of implementation is the functionality of GPSLogger, which was used on the development device.

Calculating default keys
After capturing a new handshake, the database can be queried for vulnerable router models. If a module applies, the default keys for this router series are calculated and used as input for aircrack-ng to try and recover the passphrase.

Compiling Modules
The modules for calculating Thomson/SpeedTouch and UPC1234567 (7 random digits) default keys are included in src/
Credits for the code go to the authors Kevin Devine and [peter@haxx.in].
On Linux:
gcc -fomit-frame-pointer -O3 -funroll-all-loops -o modules/st modules/stkeys.c -lcrypto
gcc -O2 -o modules/upckeys modules/upc_keys.c -lcrypto
If on Android, you may need to copy the binaries to /system/xbin/ or to another directory where binary execution is allowed.

Usage
Running install.sh will create the database, prepare the folder structure and create shortlinks to both scripts which can be moved to a directory that is on $PATH to allow execution from any location.
After installation, you may need to manually adjust INTERFACE on line 46 in airba.sh. This will later be determined automatically, but for now the default is set to wlan0, to allow out of the box compatibility with bcmon on Android.
./airba.sh starts the script, automatically scanning and attacking targets that are not found in the database. ./crackdefault.sh attempts to break known default key algorithms.
To view the database contents, run sqlite3 .db.sqlite3 "SELECT * FROM hs" in the main directory.

Update (Linux only ... for now):
Airbash can be updated by executing update.sh. This will clone the master branch into /tmp/ and overwrite the local files.

Output
_n: number of access points found
__c/m: represents client number and maximum number of clients found, respectively
-: access point is blacklisted
x: access point already in database
?: access point out of range (not visible to airodump anymore)

The Database
The database contains a table called hs with seven columns.
id: incrementing counter of table entries
lat and lon: GPS coordinates of the handshake (if available)
bssid: MAC address of the access point
essid: Name identifier
psk: WPA Passphrase, if known
prcsd: Flag that gets set by crackdefault.sh to prevent duplicate calculation of default keys if a custom passphrase was used.
Currently, the SQLite3 database is not password-protected.


Related posts

  1. Tools Used For Hacking
  2. Best Pentesting Tools 2018
  3. Pentest Tools For Windows
  4. World No 1 Hacker Software
  5. Hack Tools For Windows
  6. Nsa Hacker Tools
  7. Hacking App
  8. Hack Tools For Windows
  9. Game Hacking
  10. Termux Hacking Tools 2019
  11. Wifi Hacker Tools For Windows
  12. Hackers Toolbox
  13. Pentest Tools Open Source
  14. Pentest Tools Apk
  15. Hacking App
  16. Pentest Tools Online
  17. Black Hat Hacker Tools
  18. Computer Hacker
  19. Tools Used For Hacking
  20. Hacker Tools Linux
  21. Blackhat Hacker Tools
  22. Hacking Tools For Beginners
  23. Hacking Tools Windows 10
  24. Hacking Tools For Games
  25. Hacking Tools Windows 10
  26. Pentest Tools Windows
  27. Pentest Tools Nmap
  28. What Is Hacking Tools
  29. Tools 4 Hack
  30. Pentest Tools For Windows
  31. Pentest Tools Review
  32. Hack Tools For Pc
  33. Hacking Tools Pc
  34. Hacker Tools Free
  35. Hacker Tools Linux
  36. Computer Hacker
  37. Ethical Hacker Tools
  38. How To Make Hacking Tools
  39. Pentest Tools Bluekeep
  40. Github Hacking Tools
  41. Hacking Tools For Kali Linux
  42. Hack Tools
  43. Hack Tool Apk No Root
  44. Hacker Hardware Tools
  45. Hack Website Online Tool
  46. Hacking Tools And Software
  47. Hacker Tools Linux
  48. New Hack Tools
  49. Hacking Tools
  50. Tools 4 Hack
  51. Hack Tools
  52. Hack Tools Download
  53. Pentest Automation Tools
  54. Hack Tools Mac
  55. Hack Tools 2019
  56. Hacker Tools For Pc
  57. Pentest Tools
  58. Tools 4 Hack
  59. Hacking Apps
  60. How To Make Hacking Tools
  61. Black Hat Hacker Tools
  62. Hacker Tools Windows
  63. Hack Apps
  64. Pentest Reporting Tools
  65. How To Install Pentest Tools In Ubuntu
  66. Termux Hacking Tools 2019
  67. Hack Tools For Windows
  68. Termux Hacking Tools 2019
  69. Top Pentest Tools
  70. Hacking Tools Free Download
  71. Hack Tools
  72. Hacking Tools Kit
  73. What Are Hacking Tools
  74. Hacking Tools Windows 10
  75. Pentest Tools Apk
  76. Free Pentest Tools For Windows
  77. Hack Tools For Windows
  78. Best Hacking Tools 2019
  79. Hacking Tools Name
  80. Pentest Reporting Tools
  81. Pentest Tools For Ubuntu
  82. Pentest Tools Windows
  83. Hacker Tools Linux
  84. Hacker Tools 2020
  85. Pentest Tools Alternative
  86. Hacker
  87. Hacker Tools Apk Download
  88. Hack Website Online Tool
  89. Hacker Tools Apk
  90. Hacker Tools Online
  91. Wifi Hacker Tools For Windows
  92. Hacking Tools 2020
  93. Hack App
  94. Hacker Tools For Ios
  95. Hackers Toolbox
  96. Blackhat Hacker Tools
  97. Hacking Tools Kit
  98. Hack Tools
  99. Hacker Tools Github
  100. Pentest Tools Website
  101. Hack And Tools
  102. Hacking Tools For Pc
  103. Hacker Tools Linux
  104. Usb Pentest Tools
  105. Hacker Tools Apk Download
  106. Pentest Tools Subdomain
  107. Hackers Toolbox
  108. Hack Tools Download
  109. Pentest Tools Linux
  110. Pentest Tools Port Scanner
  111. Hacker Hardware Tools
  112. Hack Tools Download
  113. Hacking Tools For Kali Linux
  114. Hack Tools For Windows
  115. Black Hat Hacker Tools
  116. Pentest Recon Tools
  117. Growth Hacker Tools
  118. Hacking Tools 2020
  119. What Is Hacking Tools
  120. Pentest Tools Github
  121. Hack Tools Pc
  122. Hacker Tools For Pc
  123. Best Hacking Tools 2020
  124. Pentest Tools Bluekeep
  125. Hacker Tools Free
  126. Tools 4 Hack
  127. Top Pentest Tools
  128. Tools Used For Hacking
  129. Hacking Tools Free Download
  130. Hacker Security Tools
  131. Hacker Tools Apk Download
  132. Github Hacking Tools
  133. Hacker Tools Free Download
  134. Hacking Tools Online
  135. Kik Hack Tools
  136. Hacking Tools
  137. Pentest Tools Website Vulnerability
  138. Hack And Tools
  139. Easy Hack Tools

No comments:

Post a Comment