Home

Awesome

					 _______ __  __ _______ 
					|    ___|  |/  |     __|
					|    ___|     <|__     |
					|___|   |__|\__|_______|

this script is intended to be used in a Known Beacons attack, there is a very good explanation of this here, including a comparison to the well known KARMA attack.

you can use this during wireless security testing to identify client devices that have OPEN networks saved in their preferred network list.

the script works as a wrapper for several other tools.

the 2 and 5 GHz ranges are hardcoded for use in Australia, so check your local regulations before running the script with default options.

USAGE:

# ./flood-kick-sniff.sh
usage: ./flood-kick-sniff.sh [-Ufhsx] [-i interface] [-c channel(s)] [-b file] [-u file] [-t number] [-I interface] [-C channel(s)] [-a file]

	-x		disable initialisation (airmon-ng check kill, ifconfig wlan0 down/up, etc.)

[*] interface 1
	-i <interface>	specify the primary interface for flooding / hopping / sniffing
	-c <channel(s)>	specify primary interface channel(s) (default = 2 GHz spectrum. "5ghz" = 5 GHz spectrum. "all" = all. list channels e.g. "1 3 7")
	-f		enable beacon flooding
	-h		enable channel hopping
	-s		enable probe sniffing
	-U		filter output for only clients in the client mac address list
	-r <number>	beacon flood rate per second (default = 50)
	-t <number>	time in seconds between channel hopping (default = 15)
	-u <file>	specify non-default client list (default is ./client-list)
	-b <file>	specify non-default beacon list (default is ./beacon-list)

[*] interface 2
	-I <interface>	enable deauthentication on specified secondary interface
	-C <channel(s)>	specify secondary interface channel(s)
	-a <file>	specify non-default ap list (default is ./ap-list)
	
example: ./flood-kick-sniff.sh -Ufhs -b /jobs/corp/beacon.list -c "1 3 5 7 9 11" -i wlan0 -u /jobs/corp/client.list -t 30 -r 25 -I wlan1 -C "1 6 11" -a /jobs/corp/ap.list

# ./airparse.sh
[*] run airodump-ng
# airodump-ng --channel 1-13,32-116,132-165 -w <output file> --output-format csv <interface>

[*] then run airparse.sh
# airparse.sh <airodump-ng output csv> <ssid>
TROUBLESHOOTING:
DEPENDENCIES:
ACKNOWLEDGEMENTS:

wifiphisher for their known beacon list.