Browse Source

more readmes

master
Charles Reid 10 years ago
parent
commit
c787b93ca5
  1. 7
      attacking/joepesci/readme.md
  2. 14
      attacking/readme.md
  3. 12
      collating/prep_some_lines.py
  4. 11
      listening/readme.md

7
attacking/joepesci/readme.md

@ -0,0 +1,7 @@ @@ -0,0 +1,7 @@
# attack bssid
attacks a specific BSSID (access point MAC)
# attack everything
attacks every MAC in the vicinity

14
attacking/readme.md

@ -0,0 +1,14 @@ @@ -0,0 +1,14 @@
# attacks
The offense.
## Aireplay
Scripts to run aireplay-ng attacks.
## Joe Pesci
Runs besside-ng to get WPA handshakes.
This is the Joe Pesci method of getting handshakes.

12
collating/prep_some_lines.py

@ -293,9 +293,9 @@ def export_handshakes_john(hccap_files): @@ -293,9 +293,9 @@ def export_handshakes_john(hccap_files):
# hccap 2 john command:
h2j_cmd = [H2JBIN,hccap_file]
h2j_cmd = [H2JBIN,hccap_file]#,'|','tee',john_pw_file]
print ' %s'%( ' '.join(h2j_cmd) ) #+['>',john_pw_file])
print ' %s'%( ' '.join(h2j_cmd) )
# actually run the
@ -303,15 +303,13 @@ def export_handshakes_john(hccap_files): @@ -303,15 +303,13 @@ def export_handshakes_john(hccap_files):
print ' Running hccap2john to convert to John password file'
if not DRYRUN:
with open(os.devnull,'w') as fnull:
with open(john_pw_file,'w') as f2:
s = subprocess.call(h2j_cmd,stderr=fnull,stdout=f2)
with open(john_pw_file, 'w') as f:
s = subprocess.call(h2j_cmd, stdout=f)
john_files.append(john_pw_file)
print ' John the Ripper pw file = %s'%(john_pw_file)
print '\n'
print ""
print "Okay, all done."

11
listening/readme.md

@ -4,6 +4,8 @@ There are many ways to listen. @@ -4,6 +4,8 @@ There are many ways to listen.
## Airodump-ng
`airodump/`
One way is to listen with airodump-ng,
and parse its csv output into data.
@ -16,6 +18,8 @@ into Python lists, for slicing and dicing. @@ -16,6 +18,8 @@ into Python lists, for slicing and dicing.
## Scapy
`scrapy/`
Another way is to use scapy, and using Python
to script everything away.
@ -32,6 +36,9 @@ whatever handshake you want, as long as you @@ -32,6 +36,9 @@ whatever handshake you want, as long as you
give Joe Pesci a MAC address.
This is sort of like listening,
but more like listening with a
big stick. It's in the attacks directory.
but is more like listening with a
big stick.
Note that besside-ng is an attack,
so it's in the attacks directory.

Loading…
Cancel
Save