Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Infinite attack #181

Open
wants to merge 6 commits into
base: master
Choose a base branch
from
Open

Infinite attack #181

wants to merge 6 commits into from

Commits on Oct 16, 2018

  1. Minor fixes

    1) The function raw_input() sends output to stderr instead of stdout.
    User prompts should be sent to stdout.
    2) attack/wps: Fix printed message
    3) attack/all: Change comment to better reflect return value meaning
    
    Signed-off-by: Radu Nicolau <radunicolau102@gmail.com>
    RaduNico committed Oct 16, 2018
    Configuration menu
    Copy the full SHA
    2da7849 View commit details
    Browse the repository at this point in the history

Commits on Nov 21, 2018

  1. Infinite attack mode

    * `--infinite/-inf` argument activates the infinite attack mode.
      In this attack mode Wifite will enter a scan for <scan_time>
      and after that timer expires it will attack all nearby targets
      Infinite attack mode will respect all target and attack
      restrictions (-E, -b, --pmkid, etc.)
    
    * `scan_time` is configurable by using the pillage (-p) parameter
    
    * Stop the attack by sending SIGINT(Ctrl+C) while scanning for
      targets. The user will be prompted to choose between starting
      attacking targets or exit.
    
    Signed-off-by: Radu Nicolau <radunicolau102@gmail.com>
    RaduNico committed Nov 21, 2018
    Configuration menu
    Copy the full SHA
    1f1f47d View commit details
    Browse the repository at this point in the history
  2. Restrict exceptions caught in functions

    The issue was that sending Ctrl+C would not be caught by the
    try-except clause inside the scanner if the keyboard interrupt
    was sent while inside inner try-except blocks. This would
    result in airodump crashing and the Scanner.find_targets()
    function returning, instead of prompting the user with the
    choice to stop the attack.
    This could be the possible cause for issue derv82#123
    
    TODO: catch specific exceptions where possible
    
    Signed-off-by: Radu Nicolau <radunicolau102@gmail.com>
    RaduNico committed Nov 21, 2018
    Configuration menu
    Copy the full SHA
    dd0b644 View commit details
    Browse the repository at this point in the history
  3. Print more helpful airodump failure reason

    * Removed exception in case target list is empty.
    
    Normal scan mode will not be affected as it will
    try to attack an empty list. The reason I removed
    the exception is because in infinite attack mode it
    is possible to press Ctrl+C too fast, resulting in 0
    targets, yet it is not an error.
    
    * Added error messsage in case airodump crashes.
    
    The output will be the exit status code and the command
    which was ran. Because airodump also prints to stderr
    the useful output, we cannot realiably print error
    messages from airodump.
    
    * Added chipset/driver information link
    
    Despite the fact that the link says the information hasn't
    been updated, edits are still being made and the existing
    chipsets will not change their specs. Coupled with driver
    information, this link seems very useful for self debugging.
    
    Signed-off-by: Radu Nicolau <radunicolau102@gmail.com>
    RaduNico committed Nov 21, 2018
    Configuration menu
    Copy the full SHA
    d33eed1 View commit details
    Browse the repository at this point in the history
  4. Implement --power option

    Only display and attack APs that had at least <power> during the
    current scan.
    
    Because the power is not very stable it was possible for a target
    to drop below the power level and be deleted from the target list.
    This would in turn cause the updated targets not to overwrite the
    existing list, which would cause wifite to output an unnecessary
    amount of lines. The workaround is to compare the maximum amount
    of power an AP had.
    
    Signed-off-by: Radu Nicolau <radunicolau102@gmail.com>
    RaduNico committed Nov 21, 2018
    Configuration menu
    Copy the full SHA
    49af56c View commit details
    Browse the repository at this point in the history
  5. 2.2.6: Version bump for recent updates (Infinite attack mode, --power…

    … parameter)
    
    Signed-off-by: Radu Nicolau <radunicolau102@gmail.com>
    RaduNico committed Nov 21, 2018
    Configuration menu
    Copy the full SHA
    84f0b89 View commit details
    Browse the repository at this point in the history