📄 airoscript.conf
字号:
#!/bin/bash# Showing options: TERMINAL="xterm" # This is the most used term, and the most tested. if you comment this line default x-terminal-emulator will be used# This makes airoscript more interactive, if you want it to ask you less, comment next line INTERACTIVE=1# This allows you to use unstable functions. UNSTABLE=0# Set this to one to override mac checking FORCE_MAC_ADDRESS=0# And this, external functions EXTERNAL=0 # Disabled by default. If user wants this functions has to install 3rd party software, so i'll assume user won't wanna this by default.# Theme file THEME="default"# This way airoscript wont ask you for your resolution everytime executed. #export reson="1" # set this to your resolution number #export resonset="1" # this is also necesary#Your dhcp client utility DHCPSOFT="dhclient"# Debug: # Uncomment next line to make airoscript not launch terminals, just print the command to be executed. # CDCMD="echo " # And change this to "", if you wanna have time to read commands ;-) CLEAR="clear" #Allows all terminal windows to stay on screen after the operation they contain is finished DEBUG="0"#This is the interface you want to use to perform the attack#If you dont set this, airoscript will ask you. WIFI="" IWIFI="" # If you set wifi (and only then) you can specify Injection Wifi Card here. So if you have to use different interfaces for injection and reading, use this.#Paths # Note this can affect some configurations and some systems. # For example, in systems where you have compiled aircrack-ng # or in slax it'll be /usr/local/bin or BINDIR and SBINDIR # And, on some systems, mdk3 will be installed on /usr/local/bin/ PREFIX="/usr/local" BINDIR="$PREFIX/bin/" SBINDIR="$PREFIX/sbin/" AIRMON=$SBINDIR"airmon-ng" AIRODUMP=$SBINDIR"airodump-ng" AIREPLAY=$SBINDIR"aireplay-ng" AIRCRACK=$BINDIR"aircrack-ng" ARPFORGE=$BINDIR"packetforge-ng" WESSIDE=$SBINDIR"wesside-ng" AIRSERV=$SBINDIR"airserv-ng" TKIPTUN=$SBINDIR"tkiptun-ng" MACCHANGER=$BINDIR"macchanger" SCREENRC="$PREFIX/share/airoscript/screenrc" FUNCTIONS="$PREFIX/share/airoscript/airoscfunc.sh" SCREEN_FUNCTIONS="$PREFIX/share/airoscript/airoscfunc_screen.sh" UNSTABLEF="$PREFIX/share/airoscript/airoscfunc_unstable.sh" EXTF="$PREFIX/share/airoscript/airoscfunc_external.sh" THEMEDIR="$PREFIX/share/airoscript/themes" TERMBIN="/usr/bin/" # Change this if your terminal is not in /usr/bin, for example, on /usr/X11R6/bin or /usr/local/bin ... iwconfig="iwconfig"# Path to optional binaries MDK3="/usr/local/sbin/mdk3" # As i know, those are just used for spanish routers... JTD="jazzteldecrypter" WLD="wlandecrypter"# BUGFIXES # On some systems, dic attacks fails, this forces aircrack to use old korek method, so it luckily will work. FORCEWEPKOREK=" -K " #FORCEWPAKOREK=" -K " # Bug only affects wep, you shouldn't use it, but anyway, you can ;-) # Change this binary if you want to use other aircrack version for dic attacks (even wpa) AIRCRACKOLD=$BINDIR"aircrack-ng"#################### This is rarely modified.##########################33#This is the rate per second at wich packets will be injected INJECTRATE="330"#How many times the deauth attack is run DEAUTHTIME="4"#Time between re-association with target AP AUTHDELAY="80" KEEPALIVE="30"#Fudge factor setting FUDGEFACTOR="2"########## From here, people usually don't modify anything...################The path where the data is stored DUMP_PATH=`mktemp -d`# Create airoscript main dir mkdir ~/.airoscript 2> /dev/null# Path to your wordlist file (for WPA and WEP dictionnary attack) if [ -e ~/.airoscript/worlist.txt ]; then WORDLIST=~/.airoscript/wordlist.txt else WORDLIST="$DUMP_PATH/wordlist.txt" fi #The Mac address used to associate with AP during fakeauth FAKE_MAC="00:06:25:02:FF:D8" # IP of the AP and clients to be used for CHOPCHOP and Fragmentation attack # Host_IP and Client_IP used for arp generation from xor file (frag and chopchop) #Host_IP="192.168.1.1" #Client_IP="192.168.1.37" #Host_IP="192.168.0.1" #Client_IP="192.168.0.37" Host_IP="255.255.255.255" Client_IP="255.255.255.255"# Fragmentation IP #FRAG_HOST_IP="192.168.1.1" #FRAG_CLIENT_IP="192.168.1.37" #FRAG_HOST_IP="192.168.0.1" #FRAG_CLIENT_IP="192.168.0.37" FRAG_HOST_IP="255.255.255.255" FRAG_CLIENT_IP="255.255.255.255"# Default packet size values for tkiptun-ng attack TKIPTUN_MAX_PL=100 TKIPTUN_MIN_PL=80# You wont usually have to touch this, it's cardctl executable, automatically changed since on kernels 2.4 is carcctl and 2.6 is pccardctl if [ `uname -r|cut -d . -f 2` == "6" ]; then CARDCTL="pccardctl" else CARDCTL="cardctl" fi
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -