Skip to content

Wifi network scanning tool for capturing WPA/WPA2 Handshakes

License

Notifications You must be signed in to change notification settings

r-a-w/DriveShake

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 

Repository files navigation

|\   ___ \|\   __  \|\  \|\  \    /  /|\  ___ \ |\   ____\|\  \|\  \|\   __  \|\  \|\  \ |\  ___ \     
\ \  \_|\ \ \  \|\  \ \  \ \  \  /  / | \   __/|\ \  \___|\ \  \\\  \ \  \|\  \ \  \/  /|\ \   __/|    
 \ \  \ \\ \ \   _  _\ \  \ \  \/  / / \ \  \_|/_\ \_____  \ \   __  \ \   __  \ \   ___  \ \  \_|/__  
  \ \  \_\\ \ \  \\  \\ \  \ \    / /   \ \  \_|\ \|____|\  \ \  \ \  \ \  \ \  \ \  \\ \  \ \  \_|\ \ 
   \ \_______\ \__\\ _\\ \__\ \__/ /     \ \_______\____\_\  \ \__\ \__\ \__\ \__\ \__\\ \__\ \_______\
    \|_______|\|__|\|__|\|__|\|__|/       \|_______|\_________\|__|\|__|\|__|\|__|\|__| \|__|\|_______|
                                                   \|_________|                                        

DriveShake

Wifi network scanning tool, which can also capture WPA/WPA2 PSK handshakes. The tool automatically finds clients connected to the access point and sends deauthentication packets while sniffing for the handshake.

This tool should only be used on your own network or with the explicit legal consent of the owner of the network. The author of this tool does not condone is not responsible for misuse of this tool.

In no event shall the creators, owner, or contributors be liable for any direct, indirect, incidental, special, exemplary, or consequential damages (including, but not limited to, procurement of substitute goods or services; loss of use, data, or profits; or business interruption) however caused and on any theory of liability, whether in contract, strict liability, or tort (including negligence or otherwise) arising in any way out of the use of this software, even if advised of the possibility of such damage.

Dependencies

  • python 2.x
  • scapy

Prerequisites

To perform deauthentication attacks you must have a network card capable of injection

Usage

The tool will automatically place the wireless interface in monitor mode. From there the tool has 3 modes which can be used for different purposes.

Scanmode

The first mode is scanmode (-S). In this mode is area is simply scanned for available access points and displays various information about each access point.

Capturemode

The second mode is capturemode (-C), in this mode the tool will automatically scan for and deauthenticate clients connected to a specififed client while listening for WPA handshakes. The tool will continue scanning and attempting deauthentication until either a WPA handshake is recieved or the user temrinates the process. User must specify either a BSSID (-b) or SSID (-e) in this mode. It will save the cap file automatically in the current working directory unless otherwise specified by -o.

Automode

The third mode is automode, which will automatically scan for networks and deauthenticate clients on the networks while listening for handshakes. It will save one cap file per handshake, you can specify the output directory using -O, or it will automatically save to the current working directory.

Filters

All three modes can be filtered to specific channels (-c), BSSID (-b) or ESSIDS (-e). You can either input one BSSID/ESSID or input a file containing on BSSID/ESSID per line.

Examples

Scanmode filter for SSID "MyWifiNetwork" using wlan0 interface:

python driveshake.py -S -e MyWifiNetwork wlan0

Capturemode on network with BSSID AA:BB:CC:DD:EE:FF, output capture file to $PWD/Handshake.cap

python driveshake.py -C -b AA:BB:CC:DD:EE:FF -o Handshake.cap wlan0

Automode all networks on channel 8, will save to current working directory:

python driveshake.py -A -c 8 wlan0

About

Wifi network scanning tool for capturing WPA/WPA2 Handshakes

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Languages