-
Notifications
You must be signed in to change notification settings - Fork 27
/
ap.go
142 lines (116 loc) · 3.13 KB
/
ap.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
package models
import (
"github.com/cSploit/daemon/models/internal"
"os"
"strconv"
"strings"
"time"
)
func init() {
internal.RegisterModels(&AP{})
}
// Access Point ( courtesy of aircrack )
type AP struct {
internal.Base
Bssid string `json:"bssid"`
First time.Time `json:"first_seen"`
Last time.Time `json:"last_seen"`
Channel int `json:"channel"`
Speed int `json:"speed"`
Privacy string `json:"privacy"`
Cipher string `json:"cipher"`
Auth string `json:"auth"`
Power int `json:"power"`
Beacons int `json:"beacons"`
IVs int `json:"ivs"`
Lan string `json:"lan_ip"`
IdLen int `json:"id_len"`
Essid string `json:"essid"`
Key string `json:"key"`
//Wps bool `json:"wps"`
// Does the fake auth succeed?
FakeAuthed bool `json:"fake_auth"`
Iface Iface `json:"-"`
IfaceId uint `json:"-"`
Jobs []Job `json:"-" gorm:"many2many:job_aps;"`
}
// DEAUTH infinitely the AP using broadcast address
func (a *AP) Deauth() (j Job, e error) {
pj, e := CreateProcessJob("aireplay-ng", "-0", "0", "-a", a.Bssid, a.Iface.Name)
if e == nil {
j = pj.Job
db := internal.Db
db.Model(&j).Update("Name", "Deauth ["+a.Bssid+"]")
db.Model(&j).Association("Aps").Append(a)
}
return
}
// Try a fake auth on the ap
func (a *AP) FakeAuth() (j Job, e error) {
pj, e := CreateProcessJob("aireplay-ng", "-1", "0", "-a", a.Bssid, "-T", "1", a.Iface.Name)
if e == nil {
j = pj.Job
db := internal.Db
db.Model(&j).Update("Name", "FakeAuth ["+a.Bssid+"]")
db.Model(&j).Association("Aps").Append(a)
}
go a.checkFakeAuth(pj)
return
}
func (a *AP) checkFakeAuth(pj *ProcessJob) {
for {
if pj.ExitStatus == nil {
time.Sleep(time.Second * 1)
}
}
if strings.Contains(pj.Output, "Association successful") {
a.FakeAuthed = true
} else {
a.FakeAuthed = false
}
}
// ARP replay!!
func (a *AP) ArpReplay(iface string) (j Job, e error) {
pj, e := CreateProcessJob("aireplay-ng", "-3", "-a", a.Bssid, a.Iface.Name)
if e == nil {
j = pj.Job
db := internal.Db
db.Model(&j).Update("Name", "ArpReplay ["+a.Bssid+"]")
db.Model(&j).Association("Aps").Append(a)
}
return
}
var captures_nb = 0
// Start a capture process
func (a *AP) Capture() (j Job, e error) {
path := "go-wifi_capture-" + strconv.Itoa(captures_nb)
captures_nb += 1
// Make a specific dir so we do not mix captures
err := os.Mkdir(path, 0755)
if err != nil {
log.Error(err)
}
path += "/go-wifi"
ch := strconv.Itoa(a.Channel)
pj, e := CreateProcessJob("airodump-ng", "--write", path, "-c", ch, "--output-format", "pcap", "--bssid", a.Bssid, a.Iface.Name)
if e == nil {
j = pj.Job
db := internal.Db
db.Model(&j).Update("Name", "Capture ["+a.Bssid+"]")
db.Model(&j).Association("Aps").Append(a)
//TODO: start a routine that update the Capture record
capture := &Capture{Ap: *a, ApId: a.ID, File: path + "-01.pcap"}
db.Save(capture)
}
return
}
func FindAp(id uint) (a *AP, e error) {
a = &AP{}
e = internal.Db.Find(a, id).Error
return
}
func FindApByBssid(bssid string) (a *AP, e error) {
a = &AP{}
e = internal.Db.Where("bssid = ?", bssid).Find(a).Error
return
}