From 5db4a319e2af6be0027294fb201f1438a7b603cc Mon Sep 17 00:00:00 2001 From: v1s1t0r1sh3r3 Date: Sun, 13 Nov 2016 12:23:05 +0100 Subject: [PATCH 01/14] New system for arm architecture detection --- airgeddon.sh | 26 +++++++++++++++++--------- changelog.txt | 4 ++++ 2 files changed, 21 insertions(+), 9 deletions(-) diff --git a/airgeddon.sh b/airgeddon.sh index 76f08d68c..f0b0e98bc 100644 --- a/airgeddon.sh +++ b/airgeddon.sh @@ -8491,16 +8491,9 @@ function detect_distro_phase1() { done } -#Second phase of Linux distro detection based on version file +#Second phase of Linux distro detection based on architecture and version file function detect_distro_phase2() { - if [ "${distro}" = "Kali" ]; then - uname -m | grep "arm" > /dev/null - if [ "$?" = "0" ]; then - distro="Kali arm" - fi - fi - if [ "${distro}" = "Unknown Linux" ]; then if [ -f ${osversionfile_dir}"centos-release" ]; then distro="CentOS" @@ -8520,10 +8513,24 @@ function detect_distro_phase2() { is_raspbian=$(cat < ${osversionfile_dir}"os-release" | grep "PRETTY_NAME") if [[ "${is_raspbian}" =~ Raspbian ]]; then distro="Raspbian" + is_arm=1 fi fi fi fi + + detect_arm_architecture +} + +#Detect if arm architecture is present on system +function detect_arm_architecture() { + + uname -m | grep -i "arm" > /dev/null + + if [[ "$?" = "0" ]] && [[ "${distro}" != "Unknown Linux" ]] && [[ "${distro}" != "Raspbian" ]]; then + distro="${distro} arm" + is_arm=1 + fi } #Set some useful vars based on Linux distro @@ -8579,7 +8586,7 @@ function special_distro_features() { ywindow_edge_lines=2 ywindow_edge_pixels=10 ;; - "Parrot") + "Parrot"|"Parrot arm") networkmanager_cmd="service network-manager restart" xratio=6.2 yratio=13.9 @@ -8926,6 +8933,7 @@ function initialize_script_settings() { ywindow_edge_lines=2 ywindow_edge_pixels=18 networkmanager_cmd="service network-manager restart" + is_arm=0 } #Detect screen resolution if possible diff --git a/changelog.txt b/changelog.txt index 223448bfd..c96402e89 100644 --- a/changelog.txt +++ b/changelog.txt @@ -1,3 +1,7 @@ +5.01 +New system for arm architecture detection +Compatibility extended to Parrot arm version on Raspberry Pi + 5.0 WPS attacks menu added WPS scanning based on wash tool. Self-parametrization to avoid "Bad FCS" problem From 1b129c0c26ca2c46d60f31aff09a85db02a1db29 Mon Sep 17 00:00:00 2001 From: v1s1t0r1sh3r3 Date: Sun, 13 Nov 2016 12:28:20 +0100 Subject: [PATCH 02/14] Removed SC2034 warning. Readme updated --- README.md | 3 +-- airgeddon.sh | 3 ++- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/README.md b/README.md index f944fbc57..f22530c6e 100644 --- a/README.md +++ b/README.md @@ -20,7 +20,6 @@ This is a multi-use bash script for Linux systems to audit wireless networks.
*-Kali 2.0, 2016.1, 2016.2 and arm versions (Raspberry Pi)*
*-Wifislax 4.11.1 and 4.12*
*-Backbox 4.5.1 and 4.6*
-*-Parrot 2.2.1 and 3.1.1*
+*-Parrot 2.2.1, 3.1.1 and arm versions (Raspberry Pi)*
*-Blackarch 2016.01.10 and 2016.04.28*
*-Cyborg Hawk 1.1*
*-Debian 7 (Wheezy) and 8 (Jessie)*
diff --git a/airgeddon.sh b/airgeddon.sh index f0b0e98bc..e09ff10c2 100644 --- a/airgeddon.sh +++ b/airgeddon.sh @@ -9251,7 +9251,7 @@ function autodetect_language() { done } -#Clean some known warnings for shellcheck tool +#Clean some known and controlled warnings for shellcheck tool function remove_warnings() { echo "${clean_handshake_dependencies[@]}" > /dev/null 2>&1 @@ -9268,6 +9268,7 @@ function remove_warnings() { echo "${reaver_attacks_dependencies[@]}" > /dev/null 2>&1 echo "${bully_pixie_dust_attack_dependencies[@]}" > /dev/null 2>&1 echo "${reaver_pixie_dust_attack_dependencies[@]}" > /dev/null 2>&1 + echo "${is_arm}" > /dev/null 2>&1 } #Print a simple separator From b37451f4b81a642299ac7c3a25dec21cbc5c75d0 Mon Sep 17 00:00:00 2001 From: v1s1t0r1sh3r3 Date: Mon, 14 Nov 2016 01:41:28 +0100 Subject: [PATCH 03/14] WPS bruteforce PIN attacks (reaver and bully) --- README.md | 14 +++++------ airgeddon.sh | 65 ++++++++++++++++++++++++++++++++++++++++----------- changelog.txt | 2 ++ 3 files changed, 60 insertions(+), 21 deletions(-) diff --git a/README.md b/README.md index f22530c6e..ed5aafe7f 100644 --- a/README.md +++ b/README.md @@ -3,13 +3,13 @@ This is a multi-use bash script for Linux systems to audit wireless networks.
#Features -- Interface mode switcher (Monitor-Managed) keeping selection even with interface name changing.
-- DoS over wireless networks with different methods.
-- Assisted Handshake file capture.
+- Interface mode switcher (Monitor-Managed) keeping selection even on interface name changing.
+- DoS over wireless networks using different methods.
+- Assisted Handshake file capturing.
- Cleaning and optimizing Handshake captured files.
-- Offline password decrypt on WPA/WPA2 captured files (dictionary, bruteforce and rule based).
-- 4 Evil Twin attacks: Evil Twin with integrated sniffing, with sslstrip, "only AP" version to sniff with external sniffer and "black hole" captive portal to capture wifi passwords.
-- WPS features: WPS scanning (wash). WPS Custom pin association. WPS Pixie Dust attacks integrated with reaver and bully.
+- Offline password decrypting on WPA/WPA2 captured files (dictionary, bruteforce and rule based).
+- 4 Evil Twin attacks: Evil Twin with integrated sniffing, sslstrip mode, "only AP" version to sniff using external sniffer and "black hole" captive portal to capture wifi passwords.
+- WPS features: WPS scanning (wash). WPS Custom pin association. WPS Pixie Dust attacks integrated using reaver and bully. WPS bruteforce PIN attacks.
- Compatibility with many Linux distros (see requirements section).
- Easy targeting and selection in every section.
- Drag and drop files on console window for entering file paths.
@@ -20,7 +20,7 @@ This is a multi-use bash script for Linux systems to audit wireless networks.
diff --git a/airgeddon.sh b/airgeddon.sh index e09ff10c2..790b0b9e2 100644 --- a/airgeddon.sh +++ b/airgeddon.sh @@ -1,6 +1,6 @@ #!/bin/bash -airgeddon_version="5.0" +airgeddon_version="5.01" #Enabled 1 / Disabled 0 - Debug mode for faster development skipping intro and initial checks - Default value 0 debug_mode=0 @@ -2366,10 +2366,10 @@ function language_strings() { arr["ENGLISH",236]="Hashcat trophy file generated successfully at [${normal_color}${potenteredpath}${blue_color}]" arr["SPANISH",236]="Fichero de trofeo hashcat generado con éxito en [${normal_color}${potenteredpath}${blue_color}]" - arr["FRENCH",236]="Le fichier trophée Hashcat a bien été crée dans [${normal_color}${potenteredpath}${blue_color}]" + arr["FRENCH",236]="Le fichier trophée hashcat a bien été crée dans [${normal_color}${potenteredpath}${blue_color}]" arr["CATALAN",236]="Fitxer de trofeu hashcat generat amb èxit a [${normal_color}${potenteredpath}${blue_color}]" - arr["PORTUGUESE",236]="Arquivo troféu Hashcat gerado com sucesso [${normal_color}${potenteredpath}${blue_color}]" - arr["RUSSIAN",236]="Трофейный файл Hashcat был успешно сгенерирован в [${normal_color}${potenteredpath}${blue_color}]" + arr["PORTUGUESE",236]="Arquivo troféu hashcat gerado com sucesso [${normal_color}${potenteredpath}${blue_color}]" + arr["RUSSIAN",236]="Трофейный файл hashcat был успешно сгенерирован в [${normal_color}${potenteredpath}${blue_color}]" arr["GREEK",236]="Το hashcat αρχείο τρόπαιο δημιουργήθηκε επιτυχώς [${normal_color}${potenteredpath}${blue_color}]" arr["ENGLISH",237]="5. Lowercase + uppercase + numeric + symbol chars" @@ -4289,7 +4289,7 @@ function exec_wps_custom_pin_bully_attack() { language_strings "${language}" 366 "blue" language_strings "${language}" 4 "read" recalculate_windows_sizes - xterm -hold -bg black -fg red -geometry "${g2_stdleft_window}" -T "WPS custom pin bully attack" -e "bully ${interface} -b ${wps_bssid} -c ${wps_channel} -L --force -B -p ${custom_pin} -v ${bully_verbosity} && echo \"Close this window\"" > /dev/null 2>&1 + xterm -hold -bg black -fg red -geometry "${g2_stdleft_window}" -T "WPS custom pin bully attack" -e "bully ${interface} -b ${wps_bssid} -c ${wps_channel} -L -F -B -p ${custom_pin} -v ${bully_verbosity} && echo \"Close this window\"" > /dev/null 2>&1 } #Execute wps custom pin reaver attack @@ -4303,7 +4303,7 @@ function exec_wps_custom_pin_reaver_attack() { language_strings "${language}" 366 "blue" language_strings "${language}" 4 "read" recalculate_windows_sizes - xterm -hold -bg black -fg red -geometry "${g2_stdleft_window}" -T "WPS custom pin reaver attack" -e "reaver -i ${interface} -b ${wps_bssid} -c ${wps_channel} -L -f -n -p ${custom_pin} -vvv && echo \"Close this window\"" > /dev/null 2>&1 + xterm -hold -bg black -fg red -geometry "${g2_stdleft_window}" -T "WPS custom pin reaver attack" -e "reaver -i ${interface} -b ${wps_bssid} -c ${wps_channel} -L -f -n -p ${custom_pin} -a -g 1 -vvv && echo \"Close this window\"" > /dev/null 2>&1 } #Execute bully pixie dust attack @@ -4334,6 +4334,34 @@ function exec_reaver_pixiewps_attack() { xterm -hold -bg black -fg red -geometry "${g2_stdright_window}" -T "WPS reaver pixie dust attack" -e "reaver -i ${interface} -b ${wps_bssid} -c ${wps_channel} -K 1 -vvv && echo \"Close this window\"" > /dev/null 2>&1 } +#Execute wps bruteforce pin bully attack +function exec_wps_bruteforce_pin_bully_attack() { + + echo + language_strings "${language}" 32 "green" + + echo + language_strings "${language}" 33 "yellow" + language_strings "${language}" 366 "blue" + language_strings "${language}" 4 "read" + recalculate_windows_sizes + xterm -hold -bg black -fg red -geometry "${g2_stdleft_window}" -T "WPS bruteforce pin bully attack" -e "bully ${interface} -b ${wps_bssid} -c ${wps_channel} -L -F -B -v ${bully_verbosity} && echo \"Close this window\"" > /dev/null 2>&1 +} + +#Execute wps bruteforce pin reaver attack +function exec_wps_bruteforce_pin_reaver_attack() { + + echo + language_strings "${language}" 32 "green" + + echo + language_strings "${language}" 33 "yellow" + language_strings "${language}" 366 "blue" + language_strings "${language}" 4 "read" + recalculate_windows_sizes + xterm -hold -bg black -fg red -geometry "${g2_stdleft_window}" -T "WPS bruteforce pin reaver attack" -e "reaver -i ${interface} -b ${wps_bssid} -c ${wps_channel} -L -f -n -a -vvv && echo \"Close this window\"" > /dev/null 2>&1 +} + #Execute mdk3 deauth DoS attack function exec_mdk3deauth() { @@ -4559,8 +4587,8 @@ function wps_custom_pin_parameters() { return 0 } -#Validate pixie dust parameters -function wps_pixie_dust_parameters() { +#Validate wps pixie dust and bruteforce parameters +function wps_pixie_dust_and_bruteforce_parameters() { check_monitor_enabled if [ "$?" != "0" ]; then @@ -5172,8 +5200,8 @@ function wps_attacks_menu() { language_strings "${language}" 357 reaver_attacks_dependencies[@] language_strings "${language}" 346 bully_pixie_dust_attack_dependencies[@] language_strings "${language}" 358 reaver_pixie_dust_attack_dependencies[@] - language_strings "${language}" 347 "under_construction" #bully_attacks_dependencies[@] - language_strings "${language}" 359 "under_construction" #reaver_attacks_dependencies[@] + language_strings "${language}" 347 bully_attacks_dependencies[@] + language_strings "${language}" 359 reaver_attacks_dependencies[@] language_strings "${language}" 348 "under_construction" #bully_attacks_dependencies[@] language_strings "${language}" 360 "under_construction" #reaver_attacks_dependencies[@] print_simple_separator @@ -5236,7 +5264,7 @@ function wps_attacks_menu() { echo language_strings "${language}" 368 "yellow" language_strings "${language}" 115 "read" - wps_pixie_dust_parameters + wps_pixie_dust_and_bruteforce_parameters if [ "$?" = "0" ]; then exec_bully_pixiewps_attack fi @@ -5258,7 +5286,7 @@ function wps_attacks_menu() { echo language_strings "${language}" 370 "yellow" language_strings "${language}" 115 "read" - wps_pixie_dust_parameters + wps_pixie_dust_and_bruteforce_parameters if [ "$?" = "0" ]; then exec_reaver_pixiewps_attack fi @@ -5274,7 +5302,12 @@ function wps_attacks_menu() { if [ "$?" = "0" ]; then forbidden_menu_option else - under_construction_message + get_bully_version + set_bully_verbosity + wps_pixie_dust_and_bruteforce_parameters + if [ "$?" = "0" ]; then + exec_wps_bruteforce_pin_bully_attack + fi fi ;; 10) @@ -5282,7 +5315,11 @@ function wps_attacks_menu() { if [ "$?" = "0" ]; then forbidden_menu_option else - under_construction_message + get_reaver_version + wps_pixie_dust_and_bruteforce_parameters + if [ "$?" = "0" ]; then + exec_wps_bruteforce_pin_reaver_attack + fi fi ;; 11) diff --git a/changelog.txt b/changelog.txt index c96402e89..a6490f37d 100644 --- a/changelog.txt +++ b/changelog.txt @@ -1,6 +1,8 @@ 5.01 +WPS bruteforce PIN attacks (reaver and bully) New system for arm architecture detection Compatibility extended to Parrot arm version on Raspberry Pi +Some WPS attacks improvements 5.0 WPS attacks menu added From f343eb109eb12ee6d0cb84f1790d5eddd863e8cb Mon Sep 17 00:00:00 2001 From: v1s1t0r1sh3r3 Date: Mon, 14 Nov 2016 02:09:09 +0100 Subject: [PATCH 04/14] Imgs on README.md changed to use relative paths --- README.md | 11 +++++++---- 1 file changed, 7 insertions(+), 4 deletions(-) diff --git a/README.md b/README.md index ed5aafe7f..5430a51c2 100644 --- a/README.md +++ b/README.md @@ -1,6 +1,6 @@ #airgeddon This is a multi-use bash script for Linux systems to audit wireless networks.
- +![We'll conquer the earth!!][1] #Features - Interface mode switcher (Monitor-Managed) keeping selection even on interface name changing.
@@ -158,6 +158,9 @@ If you enjoyed the script, feel free to give a donation. Invite me to a coffee t Paypal: *v1s1t0r.1s.h3r3@gmail.com*
Bitcoin: *1AKnTXbomtwUzrm81FRzi5acSSXxGteGTH*

-![Show me the money!][1] ![Show me the money!][2] -[1]: https://raw.githubusercontent.com/v1s1t0r1sh3r3/airgeddon/master/imgs/paypal_donate.png -[2]: https://raw.githubusercontent.com/v1s1t0r1sh3r3/airgeddon/master/imgs/bitcoin_donate.png +![Show me the money!][2] +  +![Show me the money!][3] +[1]: /imgs/airgeddon_banner.png +[2]: /imgs/paypal_donate.png +[3]: /imgs/bitcoin_donate.png From f10e1e1881edd32e7b6f314e96db832baa33f774 Mon Sep 17 00:00:00 2001 From: v1s1t0r1sh3r3 Date: Mon, 14 Nov 2016 02:52:17 +0100 Subject: [PATCH 05/14] Links on README.md changed to markdown nomenclature --- README.md | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-) diff --git a/README.md b/README.md index 5430a51c2..0aa4d2310 100644 --- a/README.md +++ b/README.md @@ -159,8 +159,11 @@ Paypal: *v1s1t0r.1s.h3r3@gmail.com*
Bitcoin: *1AKnTXbomtwUzrm81FRzi5acSSXxGteGTH*

![Show me the money!][2] +[![paypal][2]](https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=7ELM486P7XKKG)   ![Show me the money!][3] -[1]: /imgs/airgeddon_banner.png -[2]: /imgs/paypal_donate.png -[3]: /imgs/bitcoin_donate.png +[![bitcoin][3]](https://blockchain.info/address/1AKnTXbomtwUzrm81FRzi5acSSXxGteGTH) + +[1]: /imgs/airgeddon_banner.png "We'll conquer the earth!!" +[2]: /imgs/paypal_donate.png "Show me the money!" +[3]: /imgs/bitcoin_donate.png "Show me the money!" From 59d9c1b02a03426f58313c5c902accfad0024356 Mon Sep 17 00:00:00 2001 From: v1s1t0r1sh3r3 Date: Mon, 14 Nov 2016 02:53:19 +0100 Subject: [PATCH 06/14] Quick fix on README.md --- README.md | 2 -- 1 file changed, 2 deletions(-) diff --git a/README.md b/README.md index 0aa4d2310..7b11ab9ff 100644 --- a/README.md +++ b/README.md @@ -158,10 +158,8 @@ If you enjoyed the script, feel free to give a donation. Invite me to a coffee t Paypal: *v1s1t0r.1s.h3r3@gmail.com*
Bitcoin: *1AKnTXbomtwUzrm81FRzi5acSSXxGteGTH*

-![Show me the money!][2] [![paypal][2]](https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=7ELM486P7XKKG)   -![Show me the money!][3] [![bitcoin][3]](https://blockchain.info/address/1AKnTXbomtwUzrm81FRzi5acSSXxGteGTH) [1]: /imgs/airgeddon_banner.png "We'll conquer the earth!!" From 03e2a4339fdae4db022c56ef440658abea0d2df5 Mon Sep 17 00:00:00 2001 From: v1s1t0r1sh3r3 Date: Mon, 14 Nov 2016 21:20:01 +0100 Subject: [PATCH 07/14] Fix #41 . Hashcat compatibility extended for v3.0 or higher --- airgeddon.sh | 43 ++++++++++++++++++++++++++++++++++++++----- changelog.txt | 1 + 2 files changed, 39 insertions(+), 5 deletions(-) diff --git a/airgeddon.sh b/airgeddon.sh index 790b0b9e2..2f7b16ed6 100644 --- a/airgeddon.sh +++ b/airgeddon.sh @@ -112,6 +112,7 @@ minimum_reaver_pixiewps_version="1.5.2" minimum_reaver_wash_large_version="1.5.2" minimum_bully_pixiewps_version="1.1" minimum_bully_verbosity4_version="1.1" +hashcat3_version="3.0" resume_message=224 abort_question=12 pending_of_translation="[PoT]" @@ -5392,6 +5393,8 @@ function decrypt_menu() { if [ "$?" = "0" ]; then forbidden_menu_option else + get_hashcat_version + set_hashcat_parameters hashcat_dictionary_attack_option fi ;; @@ -5400,6 +5403,8 @@ function decrypt_menu() { if [ "$?" = "0" ]; then forbidden_menu_option else + get_hashcat_version + set_hashcat_parameters hashcat_bruteforce_attack_option fi ;; @@ -5408,6 +5413,8 @@ function decrypt_menu() { if [ "$?" = "0" ]; then forbidden_menu_option else + get_hashcat_version + set_hashcat_parameters hashcat_rulebased_attack_option fi ;; @@ -5758,7 +5765,12 @@ function hashcat_rulebased_attack_option() { #Check if the password was decrypted using hashcat and manage to save it on a file function manage_hashcat_pot() { - if [[ ${hashcat_output} =~ "All hashes have been recovered" ]]; then + local regexp="All hashes have been recovered" + if [ -n "${hashcat_fix}" ]; then + local regexp="Status\.{1,9}:[[:space:]]Cracked" + fi + + if [[ ${hashcat_output} =~ ${regexp} ]]; then echo language_strings "${language}" 234 "yellow" @@ -6040,7 +6052,9 @@ function exec_aircrack_dictionary_attack() { function exec_hashcat_dictionary_attack() { convert_cap_to_hashcat_format - hashcat_output=$(hashcat -m 2500 -a 0 "${tmpdir}hctmp.hccap" "${DICTIONARY}" --potfile-disable -o "${tmpdir}hctmp.pot" | tee /dev/fd/5) + hashcat_cmd="hashcat -m 2500 -a 0 \"${tmpdir}hctmp.hccap\" \"${DICTIONARY}\" --potfile-disable -o \"${tmpdir}hctmp.pot\" ${hashcat_fix} | tee /dev/fd/5" + exec 5>&1 + hashcat_output=$(eval "${hashcat_cmd}") language_strings "${language}" 115 "read" } @@ -6048,7 +6062,9 @@ function exec_hashcat_dictionary_attack() { function exec_hashcat_bruteforce_attack() { convert_cap_to_hashcat_format - hashcat_output=$(hashcat -m 2500 -a 3 "${tmpdir}hctmp.hccap" "${charset}" --potfile-disable -o "${tmpdir}hctmp.pot" | tee /dev/fd/5) + hashcat_cmd="hashcat -m 2500 -a 3 \"${tmpdir}hctmp.hccap\" \"${charset}\" --potfile-disable -o \"${tmpdir}hctmp.pot\" ${hashcat_fix} | tee /dev/fd/5" + exec 5>&1 + hashcat_output=$(eval "${hashcat_cmd}") language_strings "${language}" 115 "read" } @@ -6056,7 +6072,9 @@ function exec_hashcat_bruteforce_attack() { function exec_hashcat_rulebased_attack() { convert_cap_to_hashcat_format - hashcat_output=$(hashcat -m 2500 -a 0 "${tmpdir}hctmp.hccap" "${DICTIONARY}" -r "${RULES}" --potfile-disable -o "${tmpdir}hctmp.pot" | tee /dev/fd/5) + hashcat_cmd="hashcat -m 2500 -a 0 \"${tmpdir}hctmp.hccap\" \"${DICTIONARY}\" -r \"${RULES}\" --potfile-disable -o \"${tmpdir}hctmp.pot\" ${hashcat_fix} | tee /dev/fd/5" + exec 5>&1 + hashcat_output=$(eval "${hashcat_cmd}") language_strings "${language}" 115 "read" } @@ -6972,7 +6990,6 @@ function convert_cap_to_hashcat_format() { tmpfiles_toclean=1 rm -rf "${tmpdir}hctmp"* > /dev/null 2>&1 echo "1" | aircrack-ng "${enteredpath}" -J "${tmpdir}hctmp" -b "${bssid}" > /dev/null 2>&1 - exec 5>&1 } #Handshake tools menu @@ -8455,6 +8472,22 @@ function iwconfig_fix() { fi } +#Set hashcat parameters based on version +function set_hashcat_parameters() { + + hashcat_fix="" + if compare_floats_greater_or_equal "${hashcat_version}" "${hashcat3_version}"; then + hashcat_fix=" -D 1 --force" + fi +} + +#Determine hashcat version +function get_hashcat_version() { + + hashcat_version=$(hashcat -V 2> /dev/null) + hashcat_version=${hashcat_version#"v"} +} + #Determine bully version function get_bully_version() { diff --git a/changelog.txt b/changelog.txt index a6490f37d..0e2d2af18 100644 --- a/changelog.txt +++ b/changelog.txt @@ -3,6 +3,7 @@ WPS bruteforce PIN attacks (reaver and bully) New system for arm architecture detection Compatibility extended to Parrot arm version on Raspberry Pi Some WPS attacks improvements +Extended hashcat compatibility for v3.0 or higher 5.0 WPS attacks menu added From 489c1581bebbd22388ad7e82282dc99f929b7b6a Mon Sep 17 00:00:00 2001 From: v1s1t0r1sh3r3 Date: Mon, 14 Nov 2016 21:34:15 +0100 Subject: [PATCH 08/14] Improved version detection method for bully and reaver --- airgeddon.sh | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/airgeddon.sh b/airgeddon.sh index 2f7b16ed6..f704afde3 100644 --- a/airgeddon.sh +++ b/airgeddon.sh @@ -8492,7 +8492,7 @@ function get_hashcat_version() { function get_bully_version() { bully_version=$(bully -V 2> /dev/null) - bully_version=${bully_version:1:${#bully_version}} + bully_version=${bully_version#"v"} } #Determine reaver version @@ -8502,7 +8502,7 @@ function get_reaver_version() { if [ -z "${reaver_version}" ]; then reaver_version=$(reaver -h 2> /dev/null | egrep "^Reaver v[0-9]" | awk '{print $2}') fi - reaver_version=${reaver_version:1:${#reaver_version}} + reaver_version=${reaver_version#"v"} } #Set verbosity for bully based on version From f311622b9332b7980f9bd936aaca188a95bd2647 Mon Sep 17 00:00:00 2001 From: Luan Date: Tue, 15 Nov 2016 01:27:03 -0200 Subject: [PATCH 09/14] Small update in Portuguese translation --- airgeddon.sh | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/airgeddon.sh b/airgeddon.sh index f704afde3..380928d72 100644 --- a/airgeddon.sh +++ b/airgeddon.sh @@ -3257,7 +3257,7 @@ function language_strings() { arr["SPANISH",347]="9. (bully) Ataque de fuerza bruta por PIN" arr["FRENCH",347]="9. (bully) Attaque brute force PIN" arr["CATALAN",347]="${pending_of_translation} 9. (bully) Atac de força bruta per PIN" - arr["PORTUGUESE",347]="${pending_of_translation} 9. (bully) Ataque de força bruta PIN" + arr["PORTUGUESE",347]="9. (bully) Ataque de força bruta por PIN" arr["RUSSIAN",347]="9. (bully) Атака перебором PIN" arr["GREEK",347]="9. (bully) Επίθεση PIN με χρήση ωμής βίας" @@ -3353,7 +3353,7 @@ function language_strings() { arr["SPANISH",359]="10. (reaver) Ataque de fuerza bruta por PIN" arr["FRENCH",359]="${pending_of_translation} 10. (reaver) Attaque de force brute PIN" arr["CATALAN",359]="${pending_of_translation} 10. (reaver) Atac de força bruta per PIN" - arr["PORTUGUESE",359]="${pending_of_translation} 10. (reaver) Ataque de força bruta PIN" + arr["PORTUGUESE",359]="10. (reaver) Ataque de força bruta por PIN" arr["RUSSIAN",359]="10. (reaver) Атака перебором PIN" arr["GREEK",359]="10. (reaver) Επίθεση PIN με χρήση ωμής βίας" From 7dd0f173855554d71d62696e1f4eadab18227ac4 Mon Sep 17 00:00:00 2001 From: v1s1t0r1sh3r3 Date: Wed, 16 Nov 2016 21:29:49 +0100 Subject: [PATCH 10/14] Changelog updated v5.01 --- changelog.txt | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/changelog.txt b/changelog.txt index 0e2d2af18..29d095124 100644 --- a/changelog.txt +++ b/changelog.txt @@ -3,7 +3,7 @@ WPS bruteforce PIN attacks (reaver and bully) New system for arm architecture detection Compatibility extended to Parrot arm version on Raspberry Pi Some WPS attacks improvements -Extended hashcat compatibility for v3.0 or higher +Compatibility extended for hashcat v3.0 or higher 5.0 WPS attacks menu added From d421d3e158b2172ce3afc160f275ebda5d78b7da Mon Sep 17 00:00:00 2001 From: Luan Date: Wed, 16 Nov 2016 18:45:43 -0200 Subject: [PATCH 11/14] Small changes in Portuguese String 223 was not wrong but this is more correct. The additional space in the other strings is for the alignment to be correct Alignment: http://image.prntscr.com/image/6646335a550647bdb9a3dc5878cb0cfb.png --- airgeddon.sh | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/airgeddon.sh b/airgeddon.sh index 380928d72..266b53f5d 100644 --- a/airgeddon.sh +++ b/airgeddon.sh @@ -2265,7 +2265,7 @@ function language_strings() { arr["SPANISH",223]="Es posible que el chequeo de las herramientas esenciales haya fallado porque no eres usuario root o no tienes privilegios suficientes. Lanza el script como usuario root o usando \"sudo\"" arr["FRENCH",223]="Il est possible que la vérification des outils essentiels ait échouée parce que vous n'êtes pas logué comme root ou ne disposez pas des privilèges nécessaires. Lancez le script en tant que root ou en utilisant \"sudo\"" arr["CATALAN",223]="És possible que la revisió de les eines essencials hagi fallat perquè no ets usuari root o no tens privilegis suficients. Llança l'script com a usuari root o utilitzeu \"sudo\"" - arr["PORTUGUESE",223]="Talvez a checagem das ferramentas essenciais falhou porque você não é root ou não tem privilégios suficientes. Execute o script como root ou usando \"sudo\"" + arr["PORTUGUESE",223]="Talvez a checagem das ferramentas essenciais tenha falhado porque você não é root ou não tem privilégios suficientes. Execute o script como root ou usando \"sudo\"" arr["RUSSIAN",223]="Может быть, проверка на базовые инструменты потерпела неудачу из-за того, что вы не пользователь root или не имеете достаточных привилегий. Запустите скрипт как root пользователь или используйте \"sudo\"" arr["GREEK",223]="Ίσως ο έλεγχος απαραίτητων εργαλείων απέτυχε γιατί δεν είστε root χρήστης ή δεν έχετε αρκετά δικαιώματα. Ανοίξτε το script ως root χρήστης ή χρησιμοποιήστε \"sudo\"" @@ -3257,7 +3257,7 @@ function language_strings() { arr["SPANISH",347]="9. (bully) Ataque de fuerza bruta por PIN" arr["FRENCH",347]="9. (bully) Attaque brute force PIN" arr["CATALAN",347]="${pending_of_translation} 9. (bully) Atac de força bruta per PIN" - arr["PORTUGUESE",347]="9. (bully) Ataque de força bruta por PIN" + arr["PORTUGUESE",347]="9. (bully) Ataque de força bruta por PIN" arr["RUSSIAN",347]="9. (bully) Атака перебором PIN" arr["GREEK",347]="9. (bully) Επίθεση PIN με χρήση ωμής βίας" @@ -3265,7 +3265,7 @@ function language_strings() { arr["SPANISH",348]="11. (bully) Ataque basado en base de datos de PINs conocidos" arr["FRENCH",348]=" 11. (bully) Attaque en utilisant un PIN de la base de données" arr["CATALAN",348]="${pending_of_translation} 11. (bully) Atac basat en base de dades de PINs coneguts" - arr["PORTUGUESE",348]="11. (bully) Ataque com base em banco de dados de PINs conhecidos" + arr["PORTUGUESE",348]="11. (bully) Ataque com base em banco de dados de PINs conhecidos" arr["RUSSIAN",348]="11. (bully) Атака на основе базы данных известных PIN" arr["GREEK",348]="11. (bully) Επίθεση με χρήση γνωστής βάσης δεδομένων PIN" From 36c9ccfbd9d7d8d6fae0a9c448a2e6e4df8e34e8 Mon Sep 17 00:00:00 2001 From: v1s1t0r1sh3r3 Date: Wed, 16 Nov 2016 21:57:04 +0100 Subject: [PATCH 12/14] Added compatibility for parrot arm to the known compatible list --- airgeddon.sh | 1 + 1 file changed, 1 insertion(+) diff --git a/airgeddon.sh b/airgeddon.sh index 380928d72..fdf47ee37 100644 --- a/airgeddon.sh +++ b/airgeddon.sh @@ -162,6 +162,7 @@ known_compatible_distros=( "Kali" "Kali arm" "Parrot" + "Parrot arm" "Backbox" "Blackarch" "Cyborg" From 1c381c0f75bc6d6962a96ee74c3d0681b29509b2 Mon Sep 17 00:00:00 2001 From: v1s1t0r1sh3r3 Date: Wed, 16 Nov 2016 23:48:30 +0100 Subject: [PATCH 13/14] Some spaces on menus standarized --- airgeddon.sh | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/airgeddon.sh b/airgeddon.sh index 1f63b10cc..32efa9c1a 100644 --- a/airgeddon.sh +++ b/airgeddon.sh @@ -3258,7 +3258,7 @@ function language_strings() { arr["SPANISH",347]="9. (bully) Ataque de fuerza bruta por PIN" arr["FRENCH",347]="9. (bully) Attaque brute force PIN" arr["CATALAN",347]="${pending_of_translation} 9. (bully) Atac de força bruta per PIN" - arr["PORTUGUESE",347]="9. (bully) Ataque de força bruta por PIN" + arr["PORTUGUESE",347]="9. (bully) Ataque de força bruta por PIN" arr["RUSSIAN",347]="9. (bully) Атака перебором PIN" arr["GREEK",347]="9. (bully) Επίθεση PIN με χρήση ωμής βίας" @@ -3266,7 +3266,7 @@ function language_strings() { arr["SPANISH",348]="11. (bully) Ataque basado en base de datos de PINs conocidos" arr["FRENCH",348]=" 11. (bully) Attaque en utilisant un PIN de la base de données" arr["CATALAN",348]="${pending_of_translation} 11. (bully) Atac basat en base de dades de PINs coneguts" - arr["PORTUGUESE",348]="11. (bully) Ataque com base em banco de dados de PINs conhecidos" + arr["PORTUGUESE",348]="11. (bully) Ataque com base em banco de dados de PINs conhecidos" arr["RUSSIAN",348]="11. (bully) Атака на основе базы данных известных PIN" arr["GREEK",348]="11. (bully) Επίθεση με χρήση γνωστής βάσης δεδομένων PIN" From 6798bf7d206a4a757211b80a4e7254717b365e32 Mon Sep 17 00:00:00 2001 From: v1s1t0r1sh3r3 Date: Wed, 16 Nov 2016 23:51:33 +0100 Subject: [PATCH 14/14] Some more spaces on menus standarized --- airgeddon.sh | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/airgeddon.sh b/airgeddon.sh index 32efa9c1a..4f8d6fbd7 100644 --- a/airgeddon.sh +++ b/airgeddon.sh @@ -3242,7 +3242,7 @@ function language_strings() { arr["SPANISH",345]="5. (bully) Asociación con PIN personalizado" arr["FRENCH",345]="5. (bully) Association avec PIN personnalisé" arr["CATALAN",345]="${pending_of_translation} 5. (bully) Associació amb PIN personalitzat" - arr["PORTUGUESE",345]="5. (bully) Associação com o PIN personalizado" + arr["PORTUGUESE",345]="5. (bully) Associação com o PIN personalizado" arr["RUSSIAN",345]="5. (bully) Ассоциация с персонализированным PIN" arr["GREEK",345]="5. (bully) Σύνδεση με εξατομικευμένο PIN" @@ -3250,7 +3250,7 @@ function language_strings() { arr["SPANISH",346]="7. (bully) Ataque Pixie Dust" arr["FRENCH",346]="7. (bully) Attaque Pixie Dust" arr["CATALAN",346]="${pending_of_translation} 7. (bully) Atac Pixie Dust" - arr["PORTUGUESE",346]="7. (bully) Ataque Pixie Dust" + arr["PORTUGUESE",346]="7. (bully) Ataque Pixie Dust" arr["RUSSIAN",346]="7. (bully) Атака Pixie Dust" arr["GREEK",346]="7. (bully) Επίθεση Pixie Dust"