Airsniff-ng,is an intrusion detector,spoofer, sniffer and network analyzer.
Airsniff-ng is an intrusion detector,spoofer, sniffer and network analyzer.
Only thing you have to do is
git clone https://github.com/deltaxflux/airsniff-ng
cd airsniff-ng
make
./airsniff-ng
- ARP Spoofer
- Speedport password generator
- Command completion with tab
- History for fast completion
- Config files
The installation is very simple use your favorite package manager e.g. apt or apt-get and install all required packages before running the curl script.
sudo apt-get install g++ gcc boost
sudo pacman -S g++ gcc boost
Arp spoofing is even simpler with airsniff-ng. You can use the arp_poison module. For that use following commands:
./airsniff-ng
set_gateway_ip [gateway-ip]
set_target_ip [target-ip]
set_interface [interface]
arp_poison
The speedport password generator generate a common sequenze for speedport routers. It reduces the amount of combinination greatly. Here is a quick calculation:
Possibile combinations: 8^93 = 9.73e83
Reduced amount of combinations: 1 million
To use this module use following commands:
set_ssid "WLAN-9A3907"
set_bssid "00:12:BF:9A:39:41"
gen_speedport_w500
This wordlist is saved in wordlist/speedport-w500.txt. You now can use, to bruteforce the combinations:
aircrack -w [wordlist] cap
Airsniff-ng use the gnu-readline libary. So you can use the custom command completion. Implemented commands are:
show_modules
show_help
show_settings
set_bssid
set_ssid
arp_poison
set_gateway_ip
set_target_ip
set_target_mac
set_channel
set_interface
gen_speedport_w500
clear
help
quit
You can use the detailed help manual or the man page by using:
show_help
help
All other commands get intepreted as normal bash commands,so that you don't have to exit everytime the program. Maybe in the future we will add a bash_mode ( bash command completion ) and a airsniff-ng mode ( with airsniff-ng command completion ).
set_bssid [string]
- Set a custom bssid adress
set_bssid [string]
- Set a custom ssid adress
set_channel [string/int]
- Set a custom channel adress
set_target_ip [string]
- Set a custom target ip for arp-poisoning
set_target_gateway [string]
- Set the gateway ip for arp-poisoning
set_interface [string]
- Set a custom interface, default none
show_modules
- Print all modules
show_help
- Print the help and man manual
show_settings
- Print all settings given by the user
arp_poison
- Run arp_poisoning
gen_speedport_w500
- Run the speedport generator
clear
- Clear the screen
help
- Print the help and man manual
quit
- Safe exit with 0
We try always to improve your projects. If you want to constibute create a pull request.
I modified the webserver based on the komancs webserver.
Please report issues/bugs, feature requests and suggestions for improvements to the issue tracker.