Pandora Box is an application written on Python 3 for intruding networks and recollecting information on connected devices. You can use this application alone but it is part of a system formed with three applications.
This software was developed for Kali Linux 2020.
You will need from two to three network interfaces. One to perform network attacks, one to deauthenticate when performing an Evil Twin attack and the third one to upload data to the server.
- A wireless card with Monitor Mode and packet injection for performing wireless attacks.
- A wireless card with Master Mode to establish an access point for the Evil Twin attack.
- Any network interface with internet connection except wifi (wired, 3G).
- python >3.6
- iwconfig
- ifconfig
- iptables
- aircrack-ng
- dsniff
- cowpatty
- tshark
- nmap
- dnsmasq
- reaver
- hostapd
- schedule==0.6.0
- Flask==1.1.2
For installing the software and dependencies first log in as root.
Clone the repository.
git clone https://gitlab.com/acolazo/pi169
You can install software dependencies manually via apt or use the automated script.
chmod +x install.sh
./install.sh
Then run the next script which will configure files in the directory.
chmod +x quickstart.sh
./quickstart.sh
Finally, use the package manager pip to install python dependencies.
pip install -r requirements.txt
Before running the software it is required to configure some parameters. Those parameters can be found in the file pandora/config.py. The file has comments that will guide you in configuring the parameters.
NOTE: To use this application you must be logged in as root.
This mode will passively scan. It will scan nearby networks and stations and save this data. If the parameter UPLOAD is True the data will be sent to the server.
python -m pandora -m discovery wlan0
This mode is for performing a cracking attack on a wireless access point. There are 3 possible commands in this mode.
The first command will perform an automated attack that will detect the network protocol and choose an attack according to this information.
The possible attacks are:
- WPS Pixie Dust
- WEP Fake Auth
- WPA Handshake and Online Cracking with Online Hash Crack
python -m pandora -m intrusion wlan0
The second command performs an Evil Twin.
python -m pandora -m intrusion wlan0 -et
The third command performs an Evil Twin and Deauth attack.
python -m pandora -m intrusion wlan0 -et -it2 wlan1
For this mode the device has to be connected to the network. It performs OS detection and a MITM attack to intercept traffic. If the parameter UPLOAD is True the data will be sent to the server.
python -m pandora -m recollect wlan0
For this mode the device doesn't need connection to the target network. It performs a deauth attack to an access point at a particular time that is passed as an argument.
python -m pandora -m deauth wlan0 -tmac AA:AA:AA:AA:AA:AA -dt 31/12/20-18:00
You can modify the file upload.py to suit your needs. The only required function is upload() which is called by the main.
You can modify the method online_wpa_crack of the class Aircrack in the file aircrack.py to suit your needs.
SAD
SAVI
Pandora is created to assist in penetration testing and legal investigations. It is meant to be used in a legal frame. We are not responsible for any misuse.