Exemplo n.º 1
0
    def run(self):
        time = int(self.time) / int(len(self.object['aplist']))
        if self.dict_password:
            pass
        else:
            self.create_brtue_text()
        r = Reader() # Reader class in airodump module
        nets = r.get_sorted_networks()
        for i in xrange(0, len(self.object['aplist'])):
            channel     = self.object['aplist'][i]['channel']
            bssid       = self.object['aplist'][i]['bssid']
            # Get the essid match the encoding format that AP is broadcast.
            for k in range(0, len(nets)):
                if nets[k]['bssid'] == bssid:
                    essid = nets[k]['essid']
                    break
            enc_type    = self.object['aplist'][i]['enc_type']
            public_ip   = False
            conn_host   = False
            if essid == '':
                print '[!!]Can not connect without ESSID'
                continue
            ap_crack    = Attack(self.iface, channel, bssid, essid, enc_type, timeout=time)
            ap_crack.run()
            ap_values = ap_crack.get_value()

            if ap_values['key']: # Found Key
                retval, public_ip, conn_host = network.get_ap_info(essid, bssid, enc_type, ap_values['key'], self.iface, self.public_ip_get, self.conn_host_info)

                '''
                print ap_values['key']
                if network.set_new_connection(essid, bssid, ap_values['key'], self.iface, enc_type):
                    print 'connect network success'
                    if self.public_ip_get:
                        public_ip = network.myip()
                        print 'ip : '+public_ip
                    if self.conn_host_info:
                        try:
                            conn_host = network.network_host_ip(self.iface)
                            print 'conn host :'+ conn_host
                        except IOError:
                            conn_host = False
                    # Releqse Session
                    execute('iw dev '+self.iface+' disconnect')
                    execute('ifconfig '+self.iface+' down')
                    execute('dhcpcd -k '+ self.iface)
                    execute('killall wpa_supplicant')
                else: # if 'set_new_connection' function return false
                    print '[!!] Failed to connect to AP '+ essid
                '''
            self.result_value += str({'essid': ap_values['essid'], 'bssid': ap_values['bssid'], 'inject_T': ap_values['inject_T'],
                                  'fake_auth_T': ap_values['fake_auth_T'], 'arp_req_T': ap_values['arp_req_T'], 'key': ap_values['key'],
                                  'public_ip': public_ip, 'conn_host_info': conn_host}) + ", "
            ap_crack.stop()

        self.result_value = str(self.result_value[:-2]) + ']'
Exemplo n.º 2
0
    def run(self):
        time = int(self.time) / int(len(self.option['aplist']))
        if self.dict_password:
            pass
        else:
            self.create_brtue_text()

        r = Reader()  # Reader class in airodump module
        nets = r.get_sorted_networks()
        for i in xrange(0, len(self.option['aplist'])):
            channel = self.option['aplist'][i]['channel']
            bssid = self.option['aplist'][i]['bssid']
            # Get the essid match the encoding format that AP is broadcast.
            for k in range(0, len(nets)):
                if nets[k]['bssid'] == bssid:
                    essid = nets[k]['essid']
                    break
            enc_type = self.option['aplist'][i]['enc_type']
            public_ip = False
            conn_host = False
            if essid == '':
                print '[!!] Can not connect without ESSID'
                continue
            self.apcrack = Attack(self.iface,
                                  channel,
                                  bssid,
                                  essid,
                                  enc_type,
                                  timeout=time)
            print "[*] ATTACK START"
            self.apcrack.run()
            print "[*] ATTACK END"
            ap_values = self.apcrack.get_value()

            if ap_values['key']:  # Found Key
                retval, public_ip, conn_host = network.get_ap_info(
                    essid, channel, enc_type, ap_values['key'], self.iface,
                    self.public_ip_get, self.conn_host_info)

                self.result_value = {
                    'essid': ap_values['essid'],
                    'bssid': ap_values['bssid'],
                    'inject_T': ap_values['inject_T'],
                    'fake_auth_T': ap_values['fake_auth_T'],
                    'arp_req_T': ap_values['arp_req_T'],
                    'key': ap_values['key'],
                    'public_ip': public_ip,
                    'conn_host_info': conn_host
                }
                self.result.put(self.result_value)
                print self.result
            self.apcrack.stop()
            self.apcrack = None
Exemplo n.º 3
0
    def run(self):
        time = int(self.time) / int(len(self.option['aplist']))
        if self.dict_password:
            pass
        else:
            self.create_brtue_text()

        r = Reader() # Reader class in airodump module
        nets = r.get_sorted_networks()
        for i in xrange(0, len(self.option['aplist'])):
            channel     = self.option['aplist'][i]['channel']
            bssid       = self.option['aplist'][i]['bssid']
            # Get the essid match the encoding format that AP is broadcast.
            for k in range(0, len(nets)):
                if nets[k]['bssid'] == bssid:
                    essid = nets[k]['essid']
                    break
            enc_type    = self.option['aplist'][i]['enc_type']
            public_ip   = False
            conn_host   = False
            if essid == '':
                print '[!!] Can not connect without ESSID'
                continue
            self.apcrack    = Attack(self.iface, channel, bssid, essid, enc_type, timeout=time)
            print "[*] ATTACK START"
            self.apcrack.run()
            print "[*] ATTACK END"
            ap_values = self.apcrack.get_value()

            if ap_values['key']: # Found Key
                retval, public_ip, conn_host = network.get_ap_info(essid, channel, enc_type, ap_values['key'], self.iface, self.public_ip_get, self.conn_host_info)

                self.result_value = {'essid': ap_values['essid'], 'bssid': ap_values['bssid'], 'inject_T': ap_values['inject_T'],
                                'fake_auth_T': ap_values['fake_auth_T'], 'arp_req_T': ap_values['arp_req_T'], 'key': ap_values['key'],
                                'public_ip': public_ip, 'conn_host_info': conn_host}
                self.result.put(self.result_value)
                print self.result
            self.apcrack.stop()
            self.apcrack = None