Cracking WiFi(Hanshake)
Reason this release was yanked:
Error on code
Project description
evilHunter
Argumentos:
OBLIGATORIO
[♦] evilHunter -w /path/to/wordlists
(-w / -wordlist)
(-h / --help)
INSTALACIÓN:
PyPi: (https://pypi.org/project/evilHunter/)
command_line = pip install evilHunter
Git Hub:
Command Lines:
$ git clone https://github.com/an0mal1a/evilHunter
$ cd evilHunter
$ chmod 744 evilTrust
$ sudo python3 setup.py install
REQUERIMENTS:
Esta herramienta requiere de python3 y de el pack
de herramientas de 'aircrack-ng'
- airmon-ng
- aircrack-ng
- aireplay-ng
- airodump-ng
DICCIONARIO:
RockYou install -> (https://github.com/an0mal1a/evilHunter/releases/tag/RockYou)
Procedimiento:
1. Seleccionamos interfaz de red 'compatible' (wlan0)
y la establecemos en modo monitor.
2. Escaneamos redes cercanas para guardar información sobre:
· Cifrado
· BSSID
· Canal/Channel
· ESSID/NOMBRE DE RED
3. A la vez que estamos escaneando esa red fijando la tarjeta de
red en el mismo cana, enviamos paquetes de deautenticación
4. Una véz capturado el handshake, abrimos el archivo .cap y
con diccionary attack crackeamos la contraseña.
Proximamente:
[♦] Brute Force Crack
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
evilHunter-0.1.6.tar.gz
(6.0 kB
view hashes)
Built Distribution
Close
Hashes for evilHunter-0.1.6-py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 3a059dd53ba525a8e66199d86f4c82bdeea0a20618551bc8e8edce73000d2b49 |
|
MD5 | 6c0c67a979cae213df2ff6aa2c290377 |
|
BLAKE2b-256 | fedc743dfd3540cfc661896018637597ea026082d22b31d92f0c14266b64d2c3 |