-
Notifications
You must be signed in to change notification settings - Fork 16
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
hi bro i am trying to make a script that does this .... any help with it ? #1
Comments
Have you thought about the language you intend to make the tool with?
Although if your making a tool like this it only works for rooted devices
and so it won't work for termux only Kali Linux
…On Fri, 11 Dec 2020 14:25 mina nageh salama, ***@***.***> wrote:
1- get the clients from other aps connected to our pineapple using
deauth/karma
2- grab their user agent from their connection requests(apps and sevices )
or using a captive portal page to get it faster
3- store their (device name - mac address - useragent - and the network
name that they was connected to or their ssids prob requests ) in a db
or in more details :
1- the same steps as evil twin scripts [ print the available wifi adapters
to choose from then ask if they want to scan all channels or a specific
channel then after the scan is ended using ctrl + c allow them to choose
from the ap list with of course every ap that have clients on it should
have a star in the start of the line] (this what i missing currently i
think the rest would be easy)
2- after a network is chosen we log its clients mac address in a file
3- we use probequest -m command with the clients mac file to grab their
probes only not other aps .... and for sure mdk3 should be running in the
back ground on the ap so the clients devices send probe requests of the
saved networks
4- the script then uses the collected probes to launch fake aps so we get
the clients to auto connect (karma)
5- when they auto connect the captive portal pops up and logs the
useragent of the device to a txt file with the network name where they came
from + client mac address . the page should auto close when fully load and
the client gets kicked out the network and maybe black listed
6- there should be an option to automate the process on all available APs
with clients or give the user the option to select the network he wants.
7- maybe an passive mode which will be just karma and the captive portal
so it targets the unassociated devices only.
the reason i said we collect the clients MACs is so we can collect probes
from an specific ap clients only so we can launch the attack on specific
APs.
this the most organized way i could think of doing it.
—
You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub
<#1>, or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AQ3FBWYZ27C2FQRWE6GHQUDSUIMV7ANCNFSM4UWUF6JQ>
.
|
probably a mix of bash and python there is no other option i think . |
Okay so when can we start the project??
But you should know making a WiFi tool will it require root?
…On Sat, 12 Dec 2020 01:46 mina nageh salama, ***@***.***> wrote:
Have you thought about the language you intend to make the tool with?
probably a mix of bash and python there is no other option i think .
—
You are receiving this because you commented.
Reply to this email directly, view it on GitHub
<#1 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AQ3FBW4MARCI65NGPBBNJA3SUK4ORANCNFSM4UWUF6JQ>
.
|
@TermuxHackz any time you like, i am free mostly Friday and Saturday everyweek. https://t.me/joinchat/AAAAAE5WojLeM44JIB2u5w
yup sure. |
Okay
Send me your WhatsApp number let's talk better
…On Sat, 12 Dec 2020 15:18 mina nageh salama, ***@***.***> wrote:
when can we start the project??
@TermuxHackz <https://github.com/TermuxHackz> any time you like, i am
free mostly Friday and Saturday everyweek.
But you should know making a WiFi tool will it require root?
yup sure.
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
<#1 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AQ3FBW47PNPGYW3GPTQ2JYTSUN3R7ANCNFSM4UWUF6JQ>
.
|
nope Telegram or discord or even IG , no whatsapp sorry. |
So... anything ever come to fruition with this one? |
1- get the clients from other aps connected to our pineapple using deauth/karma
2- grab their user agent from their connection requests(apps and sevices ) or using a captive portal page to get it faster
3- store their (device name - mac address - useragent - and the network name that they was connected to or their ssids prob requests ) in a db
or in more details :
1- the same steps as evil twin scripts [ print the available wifi adapters to choose from then ask if they want to scan all channels or a specific channel then after the scan is ended using ctrl + c allow them to choose from the ap list with of course every ap that have clients on it should have a star in the start of the line] (this what i missing currently i think the rest would be easy)
2- after a network is chosen we log its clients mac address in a file
3- we use probequest -m command with the clients mac file to grab their probes only not other aps .... and for sure mdk3 should be running in the back ground on the ap so the clients devices send probe requests of the saved networks
4- the script then uses the collected probes to launch fake aps so we get the clients to auto connect (karma)
5- when they auto connect the captive portal pops up and logs the useragent of the device to a txt file with the network name where they came from + client mac address . the page should auto close when fully load and the client gets kicked out the network and maybe black listed
6- there should be an option to automate the process on all available APs with clients or give the user the option to select the network he wants.
7- maybe an passive mode which will be just karma and the captive portal so it targets the unassociated devices only.
the reason i said we collect the clients MACs is so we can collect probes from an specific ap clients only so we can launch the attack on specific APs.
this the most organized way i could think of doing it.
The text was updated successfully, but these errors were encountered: