Results 1 to 8 of 8

Thread: Who's up for making a very useful script?

  1. #1
    Junior Member
    Join Date
    Jul 2007
    Posts
    34

    Question Who's up for making a very useful script?

    To get my card in monitor mode I made a script, (Xpolitz) actually has the same script.

    I did: nano m | inserted this:
    airmon-ng stop ath0
    ifconfig wifi0 down
    macchanger --mac 00:11:22:33:44:55 wifi0
    airmon-ng start wifi0

    chmod 777 m

    then all I have to do this run: ./m

    This works great for getting my card up in monitor mode - real fast. Very easy script.

    I was thinking if there are any scripters here that might be able/want to make a script so you don't have to type in ALL of your info again and again when running airodump, aireplay etc.

    Example: ./wep

    Insert AP-MAC
    Insert AP-name
    Insert AP-channel
    Insert write-file

    Then there can be a "menu"
    1. Airodump
    2. Auth - easy
    3. Auth - hard
    4. Aireplay-ng + type of attack (3,4,5 etc)
    5. Packetforge

    Each of the different inputs will open a new window with the given command all filled in.

    so it will fill in: airodump-ng -c <channel> -w <write-file> --bssid <AP> <interface>

    aireplay-ng -1 0 -e <network-name> -a <AP> -h <configured in script - mac of card> <configured in script - interface of card>


    Anyone here that would want to make a script like this?

    Thanks,
    Beamen

  2. #2
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    lol...theres a lot of wep cracking scripts here on the forums...go here...
    when I first started on this forum re49togood wrote me a script for helping him. Its for an wlan interface..but you can edit it to say ath0 wifi0 etc...this script helped me learn how to bash shell script. Hope it helps ya like it did me.

    BTW..wrong forum...ill ask to have it moved. Should be in the regular btv2.0 final main page..not the feature request. This sub-forum is meant for request for next BT2 release., and airoscript is already on BT2..look at aircrack forums for more info.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  3. #3
    Senior Member PrairieFire's Avatar
    Join Date
    Apr 2007
    Posts
    705

    Default

    chmod 755 m
    = less typing
    Μολὼν λαβέ - Great spirits encounter heavy opposition from mediocre minds.

  4. #4
    Senior Member shamanvirtuel's Avatar
    Join Date
    Mar 2010
    Location
    Somewhere in the "Ex" human right country
    Posts
    2,988

    Default

    airoscript is shit.......

    im developing something for that....see in specs topics....

    unfortunaltly it doesn't fully support atheros i don't own that cards, so i was not able to test it with atheros....

    BUT it's not publicly available for the moment only few testers here are my poor victims who are testing a full of bugs unfinished software....thx 2 them...

    stay in touch with my thread if you want, we are currently in beta stages, beta3 next private beta will also support sql database(via airolib) and wpa dict attack(via cowpatty)....

    hope you will enjoy read the thread....
    Watch your back, your packetz will belong to me soon... xD

    BackTrack :
    Giving Machine Guns to Monkeys since 2006

  5. #5
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    looking forward to being able to see airolib-ng AND cowpatty working in real life since I cant get it to work the right way.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  6. #6
    Senior Member shamanvirtuel's Avatar
    Join Date
    Mar 2010
    Location
    Somewhere in the "Ex" human right country
    Posts
    2,988

    Default

    sure they are working and not only with the test file but with my own handshake capture.....

    i can't understand what happened to you but i test it on 3 different essid and maybe ten password..........
    Watch your back, your packetz will belong to me soon... xD

    BackTrack :
    Giving Machine Guns to Monkeys since 2006

  7. #7
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    maybe you got the "magic touch" for handshakes and cowpatty...unlike me..lol

    if you can understand how to read wireshark captures..take a look at this thread...

    Code:
    http://forums.remote-exploit.org/showthread.php?p=37222#post37222
    at the bottom is my entire handshake. If you can open it with wireshark and take a quick look, and tell me where the problem is.....I'd worship you and proclaim you as my superior with WPA2.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  8. #8
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Just to update this thread, the reason I couldn't get it to work is because cowpatty isn't capable of working with AES on either WPA or WPA2. I was using WPA2 TKIP+AES. SO drop the AES and everything works perfectly.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •