-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Wifite 2? #2
Comments
Someone has done something similar but no 4g. https://gist.github.com/avin/9880dbd3b1dd6f718a298740fe26c134 |
You may also want to read this thread: https://hashcat.net/forum/post-39288.html |
wpa-sec moved to hashcat >= 4.0.1 and hcxtools >= 4.0.1
If we use this with the right supported WiFi/4g cards for pi, added a battery pack and antennas, you would be on the money: So using that method, the pi, one of the following WiFi cards: Right now this code supports this drivers in combination with a kernel >= 4.9: And the following 4G card: Then install hcxtools and download the python client: help_crack.py ( ) Open it in Gedit and add the following line to help_crack.py (line 405): Someone made a video of "Automated Wifi Attacks With HCXTOOLS" https://www.youtube.com/watch?v=3-IhrlBpoQg Wifite could be modified into a new various to support the option to let hcxtools handle the card during the needed operations and then hand it over back to wifite to run the remaining scans as well use hcxtools’ built in API to upload the files straight to onlinehashcrack.com using: (wlancap2wpasec -u https://api.onlinehashcrack.com -e [email protected] handshake_ATT2V4y9Wg_14-ED-BB-CD-22-41_2019-12-30T17-49-26.cap handshake_MySpectrumWiFi362G_58-90-43-DD-A2-3C_2019-11-26T10-17-35.cap The mobile version of wifite can be found here and further modified very quickly: https://gist.github.com/avin/9880dbd3b1dd6f718a298740fe26c134 To offload the hashing using a free service with 20 million plus password combos using GPU driven cloud severs. |
Is there a way we can revamp a small arm device that uses a 4g Broadcom card and a separate internal adapter and run a light version of nethunter on it to make this work? There cactus 2 made a storm when they created a back pack with 22 pinnacle nanos to scan every channel independently with 42 antennas rear mounted in a special back pack.
https://youtu.be/3II3K44rQx4
I think you could run a light stripper down version or Kali for arm devices now using the new repository setup with just tools we need (tshark, pyrit, John, hashcrack, aircrack-ng suite, cowpatty, reaver, etc) and it’s dependencies using the built in hooks and build the exact metapackages needed to run it and have a light weight low power consumption device that could capture pmkid, and handshakes and use the built in api for onlinehashcrack.com (wlancap2wpasec -u https://api.onlinehashcrack.com -e [email protected] handshake_ATT2V4y9Wg_14-ED-BB-CD-22-41_2019-12-30T17-49-26.cap handshake_MySpectrumWiFi362G_58-90-43-DD-A2-3C_2019-11-26T10-17-35.cap
handshake_RobertsWiFiNetwork_7C-D1-C3-CA-6C-94_2019-12-30T16-20-18.cap )
...using the Broadcom 3f/4g services to upload them to the cloud free where it can crack them using AWS servers using Highpowered NVDIA GPU processors to run the cracks against them. The only issue would be that wifite would need to reconfigured in python3 to allow hashcat handle the dump. If hcxdumptool does not handle the process itself it pollutes the handshake and will lead to a 99% failure rate. Now that I’m thinking of it, I can probably write this in a few days and make a distro avail online for pi users and we can run that on a 20k mil amp battery pack and carry it in a small backpack with 4 9db antennas to catch 2 and 5g and all you would have to do is use realVNC to remotely access the device in your back pack while walking using a cheap android tablet while walking using the untouched 4g while management the mostly automated wifite transactions while in monitor mode. If anyone is interested please let me know. The WHID pro elite uses a 3g/4g sim and create a wireless AP on airgapped systems and more to run cracks similar to this including
remotely inject keystrokes, bypass air-gapped systems, conduct mousejacking attacks, do acoustic surveillance, RF replay attacks and much more.
https://github.com/whid-injector/whid-31337
https://github.com/eliddell1/FistBump/issues/new
The text was updated successfully, but these errors were encountered: