Showing posts with label Wireless. Show all posts
Showing posts with label Wireless. Show all posts

Monday, May 27, 2013

[Aircrack-ng 1.2 Beta 1] 802.11 WEP and WPA-PSK keys cracking tool

Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attack, thus making the attack much faster compared to other WEP cracking tools.

Changelog summary

  • Compilation fixes on all supported OSes.
  • Makefile improvement and fixes.
  • A lot of fixes and improvements on all tools and documentation.
  • Fixed licensing issues.
  • Added a few new tools and scripts (including distributed cracking tool).
  • Fixed endianness and QoS issues.

Detailed changelog

* Airmon-ng: Added chipset information for ar9170usb, wl, rt2800usb, ar9271, wl12xx, RT3070STA, ath9k_htc, r871x_usb_drv, ath5k, carl9170 and various Intel drivers.
* Airmon-ng: Fixed chipset information ipw2200.
* Airmon-ng: Fixed output for r8187 driver.
* Airmon-ng: Improved chipset information for a few drivers.
* Airmon-ng: Support for displaying information about ath9k.
* Airmon-ng: Added 'check kill' to automatically kill services that could interfere.
* Airmon-ng: Fixed issues with Intel chipsets detection.
* Airmon-ng: Updated iw download link.
* Airmon-ng: Better mac80211 handling
* Airmon-ng: Added detection for WiLink TI driver, rtl819xU, iwlwifi.
* Airmon-zc: Improved version of Airmon-ng with more detailled information.
* Airdecap-ng: Fixed decoding QoS frames (Closes: #667 and #858).
* Airgraph-ng: Use Aircrack-ng Makefile instead of its own.
* Airbase-ng: Fixed bug using clients list.
* Airbase-ng: Fixed issue with QoS (ticket #760).
* Airbase-ng: Fixed sending beacons with null SSID.
* Airbase-ng: Allow non ASCII ESSID
* Airodump-ng: Fixed buffer overflow (ticket #728).
* Airodump-ng: Fixed channel parsing.
* Airodump-ng: Fixed FreeBSD battery reading.
* Airodump-ng: Renamed "Packets" column to "Frames" ("Packets" was not correct).
* Airodump-ng: Fixed XML bugs when outputting NetXML: ESSID containing '&' or chinese characters, when multiple encryption are used.
* Airodump-ng: Add alternative paths for Airodump-ng OUI file.
* Airodump-ng: Added GPSd 2.92+ support (JSON).
* Airodump-ng: Add option --manufacturer to display manufacturer column on airodump-ng.
* Airodump-ng: Add feature to show APs uptime (--uptime) based on the timestamp.
* Airodump-ng-OUI-update: Fixed OUI URL and allow CURL redirect (ticket #829).
* Airdrop-ng: removed .py from file names.
* Airdrop-ng: Fixed bug in installer.
* Airdrop-ng: Fixed OUI lookup.
* Airdrop-ng: Fixed bug when several BSSID have the same ESSID.
* Airdrop-ng: Doesn't constantly parse anymore, wait 5 seconds each time it parses.
* Airdrop-ng: Fixed crash when failing to get channel or when rules file didn't exist.
* Airdrop-ng: Fixed to use lorcon.py/lorcon2 libs.
* Airdrop-ng: Updated README.
* Airdrop-ng: Fixed error preventing update to work.
* Versuck-ng: New script to do the same thing as the kismet autowep plugin from the CLI.
* Aircrack-ng: Fixed counter display error when cracking WPA.
* Aircrack-ng: Added output of the WPA handshake to EWSA project file.
* Aircrack-ng: Added output of the WPA handshake to oclhashcat+ project file.
* Aircrack-ng: Added benchmark option, -S.
* Aircrack-ng: Fixed -u option.
* Aircrack-ng: PIC fix for hardened systems from Francisco Blas Izquierdo Riera (klondike)
* Aircrack-ng: Allow dictionaries larger than 2Gb.
* Aircrack-ng: Give a better message when there's an error with the dictionary.
* Aircrack-ng: Prevent a buffer overflow from happening (Wojciech Waga).
* Aireplay-ng: Added migration mode attack from Leandro Meiners and Diego Sor from Core Security (BlackHat Las Vegas 2010)
* Aireplay-ng, Airodump-ng: Added option to ignore issue with -1 channel.
* Airserv-ng: Fixed crash when clients disconnect.
* Besside-ng-crawler: Added EAPOL Crawler.
* Airdecloak-ng: Fixed bug when using pcap files with PPI headers.
* dcrack: Distributed cracking server/client
* wifi-detect.sh: reference script for testing wifi card detection using iwconfig vs ls /sys/class/net
* WPA Clean: Tool to merge and clean WPA capture files.
* Wireless Panda: C# Library to parse Airodump-ng output files (and added example project).
* OSdep (Linux): Setting fixed bitrates on mac80211 2.6.31 and up.
* OSdep (Linux): Added support for nl80211 thanks to impulse32. Use 'make libnl=true' to add netlink support (Ticket #1004).
* Manpages: Improvement and fixes for Airgraph-ng, Airodump-ng, packetforge-ng, Aircrack-ng
* Manpages: Fixed various spelling issues and single quote issues.
* Makefiles: Added tests for the different tools.
* Makefiles: Various fixes and improvements.
* Makefiles: Added support for libgrypt instead of OpenSSL via parameter.
* Patches: Added a few patches.
* Removed useless script: patchchk.
* Finally fixed licensing issues.
* Fixed endianness issues in most of the tools.
* Fixed cppcheck errors (Ticket #957).
* Fixed various compilation issues on Linux and Cygwin, GNU/Hurd, Darwin (OSX) and Sparc.
* Fixed compilation on recent gcc versions on Linux, Cygwin.
* Added instructions for Travis CI: Free Hosted Continuous Integration Platform for the Open Source Community.
* Added Readme.Md for GitHub. Aircrack-ng subversion repository is synced on GitHub: http://github.com/aircrack-ng/aircrack-ng
* Various other small bug fixes.


Tuesday, April 23, 2013

[Fern Wifi Cracker] Wireless security auditing and attack software to crack and recover WEP/WPA/WPS keys


Fern Wifi Cracker is a Wireless security auditing and attack software program written using the Python Programming Language and the Python Qt GUI library, the program is able to crack and recover WEP/WPA/WPS keys and also run other network based attacks on wireless or ethernet based networks

Operating System Supported

The Software runs on any Linux machine with the programs prerequisites, But the program has been tested on the following Linux based operating systems:

Prerequisites

The Program requires the following to run properly:
The following dependencies can be installed using the Debian package installer command on Debian based systems using "apt-get install program" or otherwise downloaded and installed manually


Features


Fern Wifi Cracker currently supports the following features:
  • WEP Cracking with Fragmentation,Chop-Chop, Caffe-Latte, Hirte, ARP Request Replay or WPS attack
  • WPA/WPA2 Cracking with Dictionary or WPS based attacks
  • Automatic saving of key in database on successful crack
  • Automatic Access Point Attack System
  • Session Hijacking (Passive and Ethernet Modes)
  • Access Point MAC Address Geo Location Tracking
  • Internal MITM Engine
  • Bruteforce Attacks (HTTP,HTTPS,TELNET,FTP)
  • Update Support


Monday, February 25, 2013

[Hwk] Wireless Exploitation Tool

Hwk is an easy-to-use wireless authentication and deauthentication tool. Furthermore, it also supports probe response fuzzing, beacon injection flooding, antenna alignment and various injection testing modes. Information gathering is selected by default and shows the incoming traffic indicating the packet types.



http://www.nullsecurity.net/tools/wireless.html

Tuesday, January 22, 2013

[Wifite] Automated Way To Crack Wep


How crcak WEP key using Wifite


This tool is very easy to use and very powerful if one attack method won’t work so the will start working on the next attack and the best thing is this tool is fully automatic and powerful.

Sunday, January 20, 2013

[WifiKill] Bloquea la conexión a internet de cualquier equipo conectado a nuestra misma red con tu Android


Cada día son más las aplicaciones y utilidades hacking que se descubren para el sistema operativo móvil Android.

En este caso, vamos a hablar sobre una aplicación que nos permite bloquear la conexión a internet de cualquier equipo conectado a nuestra misma red.


El programa en cuestión se llama WifiKill, y ha estado disponible en la Play Store un tiempo, hasta que la gente de Google decidió eliminarlo al ser una herramienta hacking, prohibida por los términos de licencia de dicha Play Store. Aun así, podemos descargarla sin ninguna complicación desde los foros de XDA donde el desarrollador ha ido publicando diversas actualizaciones de mejora, incluso desde el bazar de aptoide, donde se encuentra disponible en su versión más reciente (versión 1.7).

Una vez instalada la aplicación, la ejecutamos y nos aparecerá una interfaz muy sencilla de utilizar. En la parte superior tenemos un menú desde el que nos permite comenzar la búsqueda de dispositivos, así como seleccionar todos si queremos bloquear la conexión a todos y dejar nuestra red libre.


Para que el programa pueda funcionar, necesitamos tener nuestro dispositivos con permisos de superusuario o root, de lo contrario, el programa no funcionará. Una vez comenzamos a buscar las redes, el programa realiza un escaneo completo de todas las redes y todas las IP de la misma y nos las muestra en pantalla. Junto a cada red nos muestra el ID del fabricante (si es posible) y la MAC de cada red.


Seleccionando la IP que queremos bloquear, automáticamente queda sin conexión a internet, aunque, en el equipo de la víctima no aparece ningún signo de desconexión. La víctima sigue conectada a la red, pero aislada de todos los demás equipos.

¿Cómo funciona?

El funcionamiento de dicha aplicación no es otro que mediante el spoofing. El programa se hace pasar por una puerta de enlace. El programa consigue que la víctima pierda todos los paquetes ocasionando que sea imposible tener cualquier comunicación al exterior o con otros equipos permaneciendo en todo momento conectado a la red.

Contras del programa.

Tras varios usos e investigaciones sobre el programa, pese a necesitar root, los permisos que necesita la aplicación son comprensibles, por lo que, aparentemente, no tiene peligro de ser malware. También ha pasado varios tests de varios antimalware para Android.

El principal problema de la aplicación es que, una vez iniciada, si queremos cerrar la aplicación y dejar de funcionar con ella, debemos pulsar sobre el botón off en la parte superior, lo cual genera que al cerrarla, el dispositivo tenga que reiniciarse forzosamente. Si por el contrario queremos seguir utilizando el dispositivo mientras mantenemos a nuestra víctima bloqueada, podemos hacerlo sin problemas pulsando sobre la tecla Home y dejando a la aplicación funcionando en segundo plano.

Descarga gratuita

Podéis descargar el programa de forma gratuita desde el Foro de XDA-Developers.

Artículo realizado por Rubén Velasco (Ruvelro) para RedesZone.net

[Fuente]

Wednesday, January 9, 2013

[AirWin 2.0.5] Inyectar Claves en una Red Wireless sin tener una Interfaz en Modo Monitor


Liberada una nueva versión del software que te permite inyectar claves en una red wireless sin tener una interfaz en modo monitor.

screenshot Airwin 2.0.5

  1. Esta versión trae una nueva interfaz, más sencilla que la anterior habiendo eliminado campos inútiles.
  2. Permite copiar la clave una vez encontrada.
  3. Salvar los datos de la red junto a la clave si el ataque ha sido fructífero.
  4. Permite exportar un listado de redes al alcance.
  5. Permite parar un ataque a la mitad y retormarlo sin perder los progresos.

Web: http://www.bitsdelocos.es/2013/01/liberado-airwin-2-0-5/