https://github.com/p0dalirius/creap
crEAP will identify WPA Enterprise mode EAP types and harvest usernames and/or handshakes if insecure protocols are in use.
https://github.com/p0dalirius/creap
eap handshakes pentest wifi wireless wpa
Last synced: about 1 month ago
JSON representation
crEAP will identify WPA Enterprise mode EAP types and harvest usernames and/or handshakes if insecure protocols are in use.
- Host: GitHub
- URL: https://github.com/p0dalirius/creap
- Owner: p0dalirius
- Created: 2021-10-26T10:18:38.000Z (almost 4 years ago)
- Default Branch: main
- Last Pushed: 2022-03-15T11:30:01.000Z (over 3 years ago)
- Last Synced: 2024-12-18T18:50:11.841Z (10 months ago)
- Topics: eap, handshakes, pentest, wifi, wireless, wpa
- Language: Python
- Homepage:
- Size: 10.7 KB
- Stars: 24
- Watchers: 2
- Forks: 4
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- Funding: .github/FUNDING.yml
Awesome Lists containing this project
README
# crEAP
crEAP is a python script that will identify WPA Enterprise mode EAP types and if insecure protocols are in use, will attempt to harvest usernames and/or handshakes.
![]()
![]()
## Features
- [x] Analyze packets from a PCAP capture file (option `--read`).
- [x] Sniff packet in live mode on a specific interface.## Usage
```
$ ./crEAP.py -h
usage: crEAP.py [-h] [--debug] [--no-colors] [-l LOGFILE] [-r PCAP] [-i INTERFACE] [-c CHANNEL]Description message
optional arguments:
-h, --help show this help message and exit
--debug Debug mode.
--no-colors No colors mode.
-l LOGFILE, --logfile LOGFILE
Log file to save output to.
-r PCAP, --read PCAP [OPTIONAL] Read from PCAP file, else live capture is default.
-i INTERFACE, --interface INTERFACE
[OPTIONAL] Wireless interface to capture.
-c CHANNEL, --channel CHANNEL
[OPTIONAL] Wireless channel to monitor. 2.4/5GHZ spectrums supported so long as your
adapter supports it. The ALFA AWUS051NHv2 is recommended for dual band support.```
## Credits
This tool was initially developped in 2015 by [@Snizz](https://github.com/Snizz) and [@Shellntel](https://github.com/Shellntel). I refactored the code and ported it to python3 in October 2021.
## Contributing
Pull requests are welcome. Feel free to open an issue if you want to add other features.
## References
- https://www.shellntel.com/blog/2015/9/23/assessing-enterprise-wireless-networks
- https://en.wikipedia.org/wiki/Extensible_Authentication_Protocol