Airbash is a POSIX-compliant, fully automated WPA PSK handshake capture script aimed at penetration testing. It is compatible with Bash and Android Shell (tested on Kali Linux and Cyanogenmod 10.2) and uses aircrack-ng to scan for clients that are currently connected to access points (AP). Those clients are then deauthenticated in order to capture the handshake when attempting to reconnect to the AP. Verification of a captured handshake is done using aircrack-ng. If one or more handshakes are captured, they are entered into an SQLite3 database, along with the time of capture and current GPS data (if properly configured).
After capture, the database can be tested for vulnerable router models using
crackdefault.sh
. It will search for entries that match the implemented modules, which currently include algorithms to compute default keys for Speedport 500-700 series, Thomson/SpeedTouch and UPC 7 digits (UPC1234567) routers.Requirements
WiFi interface in monitor mode aircrack-ng SQLite3 openssl for compilation of modules (optional) wlanhc2hcx from hcxtools
In order to log GPS coordinates of handshakes, configure your coordinate logging software to log to .loc/*.txt (the filename can be chosen as desired). Airbash will always use the output of
cat "$path$loc"*.txt 2>/dev/null | awk 'NR==0; END{print}'
, which equals to reading all .txt files in .loc/ and picking the second line. The reason for this way of implementation is the functionality of GPSLogger, which was used on the development device.Calculating default keys
After capturing a new handshake, the database can be queried for vulnerable router models. If a module applies, the default keys for this router series are calculated and used as input for aircrack-ng to try and recover the passphrase.
Compiling Modules
The modules for calculating Thomson/SpeedTouch and UPC1234567 (7 random digits) default keys are included in
src/
Credits for the code go to the authors Kevin Devine and [peter@haxx.in].
On Linux:
gcc -fomit-frame-pointer -O3 -funroll-all-loops -o modules/st modules/stkeys.c -lcrypto
gcc -O2 -o modules/upckeys modules/upc_keys.c -lcrypto
Usage
Running
install.sh
will create the database, prepare the folder structure and create shortlinks to both scripts which can be moved to a directory that is on $PATH to allow execution from any location.After installation, you may need to manually adjust
INTERFACE
on line 46 in airba.sh
. This will later be determined automatically, but for now the default is set to wlan0
, to allow out of the box compatibility with bcmon on Android../airba.sh
starts the script, automatically scanning and attacking targets that are not found in the database. ./crackdefault.sh
attempts to break known default key algorithms.To view the database contents, run
sqlite3 .db.sqlite3 "SELECT * FROM hs"
in the main directory.Update (Linux only ... for now):
Airbash can be updated by executing
update.sh
. This will clone the master branch into /tmp/ and overwrite the local files.Output
_n
: number of access points found__c/m
: represents client number and maximum number of clients found, respectively-
: access point is blacklistedx
: access point already in database?
: access point out of range (not visible to airodump anymore)The Database
The database contains a table called
hs
with seven columns.id
: incrementing counter of table entrieslat
and lon
: GPS coordinates of the handshake (if available)bssid
: MAC address of the access pointessid
: Name identifierpsk
: WPA Passphrase, if knownprcsd
: Flag that gets set by crackdefault.sh to prevent duplicate calculation of default keys if a custom passphrase was used.Currently, the SQLite3 database is not password-protected.
Read more
- Kik Hack Tools
- How To Hack
- Hacking Tools Mac
- Hacking Tools Mac
- Hacker Techniques Tools And Incident Handling
- Pentest Tools List
- How To Hack
- Free Pentest Tools For Windows
- Hack Tools Pc
- Pentest Tools Linux
- Hacker Tools For Windows
- Pentest Tools Free
- Hacking Tools Name
- Pentest Tools
- Hacking Tools Hardware
- Hacker Search Tools
- Hacker Techniques Tools And Incident Handling
- Pentest Tools For Mac
- Hacking Tools For Mac
- Hack Tools For Pc
- Android Hack Tools Github
- Tools For Hacker
- Wifi Hacker Tools For Windows
- Hack Tools For Games
- Hack Tools Github
- Kik Hack Tools
- Hacking Tools Online
- Hacker Tools Linux
- Pentest Tools Bluekeep
- Hacking Tools For Windows 7
- Pentest Tools For Android
- Pentest Tools For Mac
- Ethical Hacker Tools
- Hacking Tools Online
- Pentest Tools For Windows
- Beginner Hacker Tools
- Hacking Tools Free Download
- Pentest Box Tools Download
- Hack Tools
- How To Install Pentest Tools In Ubuntu
- Hacker Tool Kit
- Free Pentest Tools For Windows
- Hacking Tools For Beginners
- Hacking Tools 2019
- Hacking Apps
- Pentest Tools
- Hacker Security Tools
- Pentest Tools Find Subdomains
- Termux Hacking Tools 2019
- Black Hat Hacker Tools
- What Are Hacking Tools
- Hacker Tools Free
- Nsa Hacker Tools
- Android Hack Tools Github
- What Is Hacking Tools
- Hacks And Tools
- Underground Hacker Sites
- Pentest Tools Github
- Pentest Tools Download
- Pentest Tools Website Vulnerability
- Hacking Tools Usb
- Hacking Tools Hardware
- Pentest Tools Nmap
- Hack Tools
- New Hacker Tools
- Growth Hacker Tools
- Hacker Tools Free Download
- Pentest Tools Framework
- Hackrf Tools
- Pentest Recon Tools
- Blackhat Hacker Tools
- Free Pentest Tools For Windows
- Install Pentest Tools Ubuntu
- Pentest Tools
- Hack Tools For Pc
- Pentest Tools Kali Linux
- Pentest Tools Tcp Port Scanner
- New Hacker Tools
- Hack Tool Apk No Root
- Pentest Tools Framework
- Hacker Tools For Windows
- Pentest Tools Framework
- Hacker Tools Mac
- Kik Hack Tools
- Pentest Tools
- Pentest Box Tools Download
- Hack Tools For Pc
- Hacker Tools Apk
- Hack Website Online Tool
- Hacking Tools Kit
- Top Pentest Tools
- Best Pentesting Tools 2018
- Android Hack Tools Github
- Hacking Tools And Software
- Hackrf Tools
- Beginner Hacker Tools
- Pentest Tools Bluekeep
- Pentest Tools Bluekeep
- Pentest Reporting Tools
- Github Hacking Tools
- Pentest Tools Framework
- Hack Tools
- Hack Tool Apk No Root
- World No 1 Hacker Software
- Pentest Tools List
- Tools 4 Hack
- Hack Tools Pc
- Blackhat Hacker Tools
- Tools Used For Hacking
- How To Hack
- Hacking Tools Hardware
- Pentest Tools Android
- Hacking Tools For Kali Linux
- Hacking Tools And Software
- Game Hacking
- Pentest Tools Android
- Hacker Tools Online
- Hack Tools For Windows
- Hacking Tools Online
- Physical Pentest Tools
- Hacker Tools Github
- Pentest Tools Port Scanner
- Hacking Tools Windows 10
- Hacking Tools For Kali Linux
- Pentest Tools Review
- Hack Tools For Games
- Hacking Tools For Pc
- Ethical Hacker Tools
- Hacking Tools
- Pentest Tools
- Android Hack Tools Github
- Blackhat Hacker Tools
- Usb Pentest Tools
- Black Hat Hacker Tools
- Pentest Tools Website
- Pentest Tools Nmap
- Pentest Automation Tools
- Hacking Tools Windows 10
- Hacking Tools Hardware
- Hack Tools 2019
- Hack Tools Pc
- Tools For Hacker
- Hacker Tools Software
- Underground Hacker Sites
- New Hacker Tools
- Pentest Tools Url Fuzzer
- Pentest Tools Windows
- Hack Tools Online
- Hacks And Tools
- Hacking Tools And Software
- Hacker Tools Linux
- Pentest Tools Tcp Port Scanner
- Hacker Tools Software
- Hack Tools