+
Skip to content

Airraid glues together aircrack-ng, hashcat, and some forethought. Airraid is autonomous, and uses OSINT to try to accelerate the password cracking phase. You can also collect hashes to try in hashcat later.

Notifications You must be signed in to change notification settings

zephyrgoose/airraid

Repository files navigation

airraid

This is a BIG work-in-progress

Airraid glues together aircrack-ng, hashcat, and some forethought. Airraid is autonomous, and uses OSINT to try to accelerate the password cracking phase. You can also collect hashes to try in hashcat later.

Since this is a WIP, there are several seperate scripts mean to be ran by the end-user:

  • airraid.py
  • bulk_discriminator.py
  • handshake_capturer.py

I'm fairly sure all of them need sudo.

airraid.py currently runs bulk_accumulator.py, which works to create wireless_bulk.json, a file collecting details about wireless networks and clients.

bulk_discriminator.py performs analysis on wireless_bulk.json, and is meant to be ran after (at least after starting) bulk_accumulator.py.

handshake_capturer.py takes various network and client details as inputs, and listens for 4-way handshakes. If it detects one it automatically saves the handshake to captured_handshakes/, deleteds the temporary files used, and exits gracefully.

Tested and created with python 3.10.10. Required Linux packages [version tested on]:

  • pyrcrack [1.2.6]
  • asyncio [3.4.3]
  • aircrack-ng [1.7] (built-in)
  • iwconfig [WT-30] (built-in)
  • net-tools [2.10] (built-in)
  • hashcat [6.2.6] (built-in)

Required python packages (currently all built-in):

  • tempfile
  • signal
  • time
  • csv
  • os
  • glob
  • subprocess

About

Airraid glues together aircrack-ng, hashcat, and some forethought. Airraid is autonomous, and uses OSINT to try to accelerate the password cracking phase. You can also collect hashes to try in hashcat later.

Resources

Stars

Watchers

Forks

Languages

点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载