https://github.com/sircryptic/wardriver
bash script to automate wardriving tasks. (Wi-Fi & Bluetooth)
https://github.com/sircryptic/wardriver
bash-script cyber-security cybersecurity cybersecurity-education mapping network-analysis networking offsec wardriving
Last synced: 3 months ago
JSON representation
bash script to automate wardriving tasks. (Wi-Fi & Bluetooth)
- Host: GitHub
- URL: https://github.com/sircryptic/wardriver
- Owner: SirCryptic
- License: mit
- Created: 2023-02-08T04:06:28.000Z (over 2 years ago)
- Default Branch: main
- Last Pushed: 2023-02-14T11:11:31.000Z (over 2 years ago)
- Last Synced: 2025-04-14T00:34:14.786Z (6 months ago)
- Topics: bash-script, cyber-security, cybersecurity, cybersecurity-education, mapping, network-analysis, networking, offsec, wardriving
- Language: Shell
- Homepage:
- Size: 12.7 KB
- Stars: 9
- Watchers: 1
- Forks: 3
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# wardriver
bash script to automate wardriving tasks.
Usage:
```
sudo bash install.sh
``````
./wardriver
```1) scan for available wireless networks and filters the results using grep and awk to obtain the network name (ESSID), address (MAC address), signal strength, and encryption type of each network. The results are stored in a file "wireless_networks.txt". The user is then prompted if they want to map the wireless networks, and if they choose "y", a plot of the signal strength of each network is generated using gnuplot and saved in a file "wireless_network_map.png".
2) scans available Bluetooth devices using hcitool command and filters the results using awk to obtain the device addresses. The results are stored in a file "available_bluetooth_devices.txt", The script will then attempt to connect to each device in the stored file using the bluez-simple-agent tool and print a message indicating whether the connection was successful or not.
3) captures wireless handshakes using airodump-ng, saves them to a file, The captured data is converted to a format that can be used by aircrack-ng before the cracking process is started and then uses aircrack-ng with a wordlist to attempt to crack the captured handshakes.
# FOOT NOTE
You can also find this script in my script-dumping-ground repository [HERE ](https://github.com/SirCryptic/script-dumping-ground)