Skip to content

xpz3/airgeddonplugins

Repository files navigation

airgeddonplugins

Disclaimer: I won't be responsible for anything you use with these plugins. Please use them for educational purposes only

Description

  • avoid_airmon.sh: This plugin disables airmon-ng to be used to start and stop monitor mode on an interface. iwwill be used instead.
  • multint.sh: This plugin enables Airgeddon to use more than one interface to be used with Captive Portal attack. By default, Airgeddon uses Virtual Interface method on supported chipsets to create monitor mode and master mode required to run captive portal attack. For users who do not have a fully compatible chipset, they can use this plugin to use multiple cards that support monitor and master mode one per card to run captive portal attack.
  • nogui.sh: This plugin voids the requirement of xterm or tmux for evil twin attack. This plugin only works with Evil Twin attack with Captive Portal method (Option 9 in Evil Twin attacks menu)
  • custom_essid.sh: This plugin allows you to specify custom name for a target AP with hidden SSID, after discovering it with deauth attack.
  • mass_handshake_capture.sh: This plugin allows you to mass capture Handshake/PMKID from nearby WPA networks. After downloading the plugin to the airgeddon/plugins directory, run airgeddon, select interface and put the card into monitor mode and then goto Handshake/PMKID/Decloaking tools menu and choose Option 10. Mass Handshake/PMKID Capture and then follow the instructions. There are some variables that can be set according to the needs. Open the plugin file and see the top section. The minimum required airgeddon version is now 11.50. In the new update this plugin allows you to save the AP details(essid, bssid, channel, encryption and handshake/PMKID file location) whose handshake has been captured. You can use this file to automatically start Evil Twin captive portal attack using airgeddon_cli.sh plugin which takes the file as an argument and starts the evil twin attack.
  • airgeddon_cli.sh This plugin enables command line interface for airgeddon evil twin with captive portal attack. It can work in two ways, one is to specify just the vif capable interface and a file containing essid, bssid, channel, encryption type and handshake/PMKID file location. The plugin will then start the evil twin attack using the provided values in the file. All other options will be set to default and can be edited from the plugin. The second method to use the plugin is to specify the bssid, essid, channel, encryption type, handshake/PMKID file path, vif capable interface and any other desired values as command line arguments. The detailed usage info can be found by downloading the plugin and then running bash airgeddon.sh -u If no command line arguments are passed, airgeddon will start normally.
  • autoload_handshake.sh This plugin automatically loads a previously captured handshake file for a selected target, if the user wishes to. You can change the default handshake location by editing the variable in the file.
  • customportals.sh This plugin makes it easy to create or edit custom portals for use with airgeddon. It has all the portals from Fluxion included and most if not all bugs were fixed. The plugin ensures compatibility with airgeddon. If you just want to use these portals, you don’t need to make any changes. Simply download the plugin file along with the `customportals/` directory into the airgeddon plugins folder. Then run airgeddon as usual, and towards the end it will ask whether you want to use a custom portal or not. If you answer yes, it will list all the available custom portals in the plugins/customportals/ directory. It will display all the individual portal folders inside it. When you want to create a new portal, create or download the necessary files, place them in a directory and copy that directory into the plugins/customportals/ folder along with the others. There are a few things to keep in mind when developing a custom portal. Only use .html files avoiding use of .htm files, as they will not work. Your portal must include a <form> tag with a password field named "password|password1|passphrase|key|key1|wpa|wpa_psw". The <form> tag must post to check.htm with the password field and its value. If you want to use PHP in your custom portal, you must install php-cgi, Apache, or any other handler, and uncomment the line containing the variable customportals_php_handle=0 in customportals.sh. That will enable the use of PHP files as real PHP and make them compatible with airgeddon. If you have any questions, please ask in the airgeddon Discord server #plugins-development channel rather than opening a bug report here. The minimum required airgeddon version is now 11.60.

Usage
Just download and copy the plugin file to the plugins folder inside airgeddon directory. Please do not rename any plugin file. After copying the file, just run airgeddon as you normally would and the plugin will do its job.