WiFiBroot : A WiFi Pentest Cracking tool for WPA/WPA2

WiFiBroot is a WiFi-Penetest-Cracking tool for WPA/WPA2 (Handshake, PMKID, Offline Cracking, EAPOLS, Deauthentication Attack).

It is built to provide clients all-in-one facility for cracking WiFi (WPA/WPA2) networks. It heavily depends on scapy, a well-featured packet manipulation library in Python.

Almost every process within is dependent somehow on scapy layers and other functions except for operating the wireless interface on a different channel. That will be done via native linux command iwconfig for which you maybe need sudo privileges.

It currently provides four independent working modes to deal with the target networks. Two of them are online cracking methods while the other runs in offline mode. The offline mode is provided to crack saved hashes from the first two modes.

One is for deauthentication attack on wireless network and can also be used as a jamming handler. It can be run on a variety of linux platforms and atleast requires WN727N from tp-link to properly operate.

Also Read – Slurp : Evaluate The Security Of S3 Buckets

Installation

WiFiBroot heavily depends on scapy. So, you would need scapy installed. Almost, every other library would likely be installed on your system. Make sure the version you install for scapy should be <=2.4.0. Newer versions are likely to throw some unknown errors.

$ sudo pip install scapy==2.4.0

The script is supposed to be run under sudo but it will still work even if not run under the root mode. The basic necessary arguments are:

$ sudo python wifibroot.py -i [interface] -d /path/to/dictionary -m [mode]

Documentation

WiFiBroot uses modes to identify which attack you want to perform on your target. Currently, there are three available modes. The usage of each mode can be seen by supplying the –help/-h option right after the -m/–mode option. Here’s a list of available modes and what they do:

Modes

Syntax:
$ python wifibroot.py [–mode [modes]] [–options]
$ python wifibroot.py –mode 2 -i wlan1mon –verbose -d /path/to/list -w pmkid.txt

Modes:
# Description Value
01 Capture 4-way handshake and crack MIC code 1
02 Captures and Crack PMKID (PMKID Attack) 2
03 Perform Manual cracking on available
capture types. See –list-types 3
04 Deauthentication. Disconnect two stations
and jam the traffic. 4

Use -h, –help after -m, –mode to get help on modes.

Each mode has a specific purpose and has it’s own options:

HANDSHAKE:

Mode:
01 Capture 4-way handshake and crack MIC code 1

Options:
Args Description Required
-h, –help Show this help manual NO
-i, –interface Monitor Interface to use YES
-v, –verbose Turn off Verbose mode. NO
-t, –timeout Time Delay between two deauth
requests. NO
-d, –dictionary Dictionary for Cracking YES
-w, –write Write Captured handshake to
a seperate file NO
–deauth Number of Deauthentication
frames to send NO

Filters:
-e, –essid ESSID of listening network
-b, –bssid BSSID of target network.
-c, –channel Channel interface should be listening
on. Default: ALL

PMKID ATTACK

Mode:
02 Captures and Crack PMKID (PMKID Attack) 1
Options:
Args Description Required
-h, –help Show this help manual NO
-i, –interface Monitor Interface to use YES
-v, –verbose Turn off Verbose mode. NO
-d, –dictionary Dictionary for Cracking YES
-w, –write Write Captured handshake to
a seperate file NO
Filters:
-e, –essid ESSID of listening network
-b, –bssid BSSID of target network.
-c, –channel Channel interface should be listening
on. Default: ALL

Offline Cracking

Mode:
03 Perform Manaul cracking on available capture
types. See –list-types 3
Options:
Args Description Required
-h, –help Show this help manual NO
–list-types List available cracking types NO
–type Type of capture to crack YES
-v, –verbose Turn off Verbose mode. NO
-d, –dictionary Dictionary for Cracking YES
-e, –essid ESSID of target network.
Only for HANDSHAKE Type YES
-r, –read Captured file to crack YES

DEAUTHENTICATION ATTACK (Stress Testing)

Mode:
04 Deauthentication. Disconnect two stations
and jam the traffic. 4
Options:
Args Description Required
-h, –help Show this help manual NO
-i, –interface Monitor Mode Interface to use YES
-0, –count Number of Deauthentication
frames to send. ‘0’ specifies
unlimited frames YES
–ap Access Point MAC Address NO
–client STA (Station) MAC Address NO

Examples

To Capture 4-way handshake and crack MIC code:

$ python wifibroot.py –mode 1 -i wlan1mon –verbose -d dicts/list.txt -w output.cap

To Capture and Crack PMKID:

$ python wifibroot.py –mode 2 -i wlan1mon –verbose -d dicts/list.txt -w output.txt

Offline Crack Handshake and PMKID:

$ python wifibroot.py –mode 3 –type handshake –essid “TARGET ESSID” –verbose -d dicts/list.txt –read output.cap
$ python wifibroot.py –mode 3 –type pmkid –verbose -d dicts/list.txt –read output.txt

Deauthentication attack in various form:

–> Ultimate Deauthentication attack:
$ python wifibroot.py –mode 4 -i wlan1mon -00 –verbose
–> Disconnect All Clients from Acess Point:
$ python wifibroot.py –mode 4 -i wlan1mon –ap [AP MAC] –verbose
–> Disconnect a Specific Client:
$ python wifibroot.py –mode 4 -i wlan1mon –ap [AP MAC] –client [STA MAC] –verbose

R K

Recent Posts

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

1 week ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

2 weeks ago

Red Team Certification – A Comprehensive Guide To Advancing In Cybersecurity Operations

Embark on the journey of becoming a certified Red Team professional with our definitive guide.…

3 weeks ago

CVE-2024-5836 / CVE-2024-6778 : Chromium Sandbox Escape via Extension Exploits

This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…

3 weeks ago

Rust BOFs – Unlocking New Potentials In Cobalt Strike

This took me like 4 days (+2 days for an update), but I got it…

3 weeks ago

MaLDAPtive – Pioneering LDAP SearchFilter Parsing And Security Framework

MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…

3 weeks ago