Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/icsec/airpwn-ng
Packet injection for wifi; simplified.
https://github.com/icsec/airpwn-ng
hacking packetinjector packetsniffing python wifi
Last synced: 7 days ago
JSON representation
Packet injection for wifi; simplified.
- Host: GitHub
- URL: https://github.com/icsec/airpwn-ng
- Owner: ICSec
- License: gpl-3.0
- Created: 2021-07-20T03:43:13.000Z (over 3 years ago)
- Default Branch: main
- Last Pushed: 2022-11-07T02:22:34.000Z (about 2 years ago)
- Last Synced: 2024-09-25T22:19:52.233Z (about 2 months ago)
- Topics: hacking, packetinjector, packetsniffing, python, wifi
- Language: Python
- Homepage: https://gitter.im/ICSec/airpwn-ng
- Size: 10.3 MB
- Stars: 35
- Watchers: 4
- Forks: 13
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Concept
airpwn-ng is a framework for 802.11 (wireless) packet injection. It sniffs for wireless packets and if the data matches a specified trigger, custom content is injected. From the perspective of the wireless client, airpwn-ng is the server.airpwn-ng is based on the concepts laid out in [Airpwn](http://airpwn.sourceforge.net/Airpwn.html).
## How does this work?
* http://airpwn.sourceforge.net/Documentation.html
* https://github.com/ICSec/dc25## Requirements
* [Aircrack-NG](https://www.aircrack-ng.org/install.html)
* [Scapy](https://github.com/secdev/scapy)## Installation
With scapy at version 2.4.5 and Aircrack-NG at 1.7 or greater run the following:
```
python3 -m pip install RESOURCEs/airpwn-ng-*.tar.gz
```## Example usage
Open Wireless using 1 NIC
```
python3 ./airpwn-ng -i -m --injection payloads/demo
```Open Wireless using 2 NICs
```
## Assumes the NIC designated for injection is in a managed state
python3 ./airpwn-ng -i -m --injection payloads/demo --inj man
```WEP using 1 NIC with airtun-ng
```
## Typical usage
airtun-ng -a -w
ifconfig at0 up
python3 ./airpwn-ng -i at0 -m at0 --injection payloads/demo --tun
```WEP using 2 NICs with airtun-ng
```
## Niche usage
airtun-ng -a -w
ifconfig at0 up
python3 ./airpwn-ng -i -m at0 --injection payloads/demo --inj man --tun
```WPA using 1 NIC with airtun-ng
```
## Typical usage
airtun-ng -a -e -p
ifconfig at0 up
python3 ./airpwn-ng -i at0 -m at0 --tun --injection payloads/demo
```WPA using 2 NICs with airtun-ng
```
## Niche usage
airtun-ng -a -e -p
ifconfig at0 up
python3 ./airpwn-ng -i -m at0 --tun --injection payloads/demo --inj man
```### Known issues
* [edgedressing](https://github.com/stryngs/edgedressing) will affect most modern Windows clients in a negative way. In order to deal with how Windows figures out if it is online, the --trigger functionality should be utilized. By default if --trigger is not called then 'GET /' becomes the string that airpwn-ng uses for understanding if an injection should occur or not. This behavior is not ideal and may cause a Windows target to have connectivity issues if not adjusted for.### Disclaimer
Illicit usage of this code has the potential to land the user in Legal and/or Civil jeopardy if used for malicious purposes or even unknowingly by perhaps using the wrong MAC filter as an example. Ensure you know what the syntax you are running actually does. airpwn-ng is a research tool aimed at demonstrating TCP injection. The authors of airpwn-ng, airpwn and pretty much every other hacking tool out there take no, zip, zilch, zero and nada on the responsibility for what you the user does with it.[![Join the chat at https://gitter.im/ICSec/airpwn-ng](https://badges.gitter.im/ICSec/airpwn-ng.svg)](https://gitter.im/ICSec/airpwn-ng?utm_source=badge&utm_medium=badge&utm_campaign=pr-badge&utm_content=badge)