Captura y crack #WPA/2 Handshakes con HandShaker

Detectar, capturar y descifrar Handshakes por ESSID parcial. Este script es está diseñado para automatizar la tarea de capturar y cracking EAOPL WPA/2 handshake.

Caracteristicas

  • Detectata, desautoriza, captura, el crack WPA/2 Handshake y claves WEP.
  • Crack WPS pins.
  • Registro AP de ubicación con GPS Android.
  • Mantener una base de datos de puntos de acceso pwnd para evitar repeticiones.

Instalación:

Ejecutar ‘make install’ en el directorio HandShaker. handshaker Ahora se instalará y se puede ejecutar con ‘handshaker’.

Uso

    HandShaker - Detect, deauth, capture, crack WPA/2 handshakes and WEP Keys automagically. 
     by d4rkcat <rfarage@yandex.com>

    Usage:  handshaker <Method> <Options>

    Method:
        -a - Autobot or wardriving mode
        -e - Search for AP by partial unique ESSID
        -l - Scan for APs and present a target list
        -c - Crack handshake from pcap
        -r - WPS Cracking with reaver

    Options:
        -i  - Wireless Interface card
        -i2 - Second wireless card (better capture rate)
        -w  - Wordlist to use for cracking
        -o  - Save handshakes to custom directory
        -d  - Deauth packets sent to each client (default 1)
        -p  - Only attack clients above this power level
        -g  - Use android GPS to record AP location
        -B  - Use besside-ng to capture handshakes
        -E  - Use evil twin AP to capture handshakes
        -M  - Use mdk3 for deauth (default aireplay-ng)
        -T  - Attempts to capture per AP (default 3)
        -W  - Only attack WEP encrypted APs
        -s  - Silent
        -h  - This help

    Examples: 
         handshaker -a -i wlan0 -T 5                   ~ Autobot mode on wlan0 and attempt 5 times.
         handshaker -e Hub3-F -w wordlist.txt          ~ Find AP like 'Hub3-F' and crack with wordlist.
         handshaker -l -o out/dir                      ~ List all APs and save handshakes to out/dir.
         handshaker -c handshake.cap -w wordlist.txt   ~ Crack handshake.cap with wordlist.

    all your AP are belong to us..

 

HandShaker - Detect, deauth, capture and crack WPA/2 handshakes

Usage: handshaker <Method> <Options> [in any order]

    Method:
        -a - Autobot or Wardriving mode
        -e - Search for AP by partial unique ESSID
        -l - Scan for APs and present a target list
    Options:
        -i - Wireless Interface card
        -w - Wordlist to use for cracking
        -h - This help

eg. handshaker -e Hub3-F -i wlan0 -w /usr/share/wordlists/rockyou.txt    - Search for essids like Hub3-F using wlan0 and crack with wordlist
    handshaker -a -i wlan0                       - Autobot or wardriving mode using wlan0

 

Leave a Reply

%d bloggers like this: