An aircrack-ng gui interface using python-gtk3.
Performing a bruteforce attack on WPA/WPA2 networks using aircrack-ng and iw
.
- make sure aircrack-ng &
xterm
are installed - Clone the repo
git clone https://github.com/t-gitt/aircrack-ng-gui.git
cd aircrack-ng-gui/
- Install the script by
sudo python start.py install
- It should have added the script to /usr/bin/ and you can now run it from the terminal by
sudo aircrack-ng-gui.py
- You can uninstall it through pip by
pip uninstall aircrack-ng-gui
- make sure aircrack-ng &
xterm
are installed - clone the repo
cd aircrack-ng-gui/
- install dependencies by
pip install -r requirements.txt
- run aircrack-ng-gui by
sudo python aircrack-ng-gui/aircrack-ng-gui.py
| make sure you are running it with python 3
Airodump-ng output files are saved in
/home/$USER/.aircrack-ng-gui/
Main Window where user can choose to go to Scan, airmon-ng, and aircrack-ng windows after selecting the interface (wlp4s0)
A window to check, start or stop airmon-ng, along with starting and stopping systemd NetworkManager.service
A wifi access point scanning window. After choosing their interface, the user can scan for wifi ap using iw. Then, after choosing the target ap, they can go to airodump-ng after starting airmon-ng
Very similar to Airmon-ng window, except this one pass the ssid variables "SSID, BSSID, CHANNEL" to Airodump-ng window
To run airodump-ng (via desired terminal emulator) on the targeted SSID and output the file (with the handshake) to a desired file name. | (could be done better using STDERR and subprocess)
After running airodump-ng, the user can use aireplay to send deauthentication packets for desired n times and a desired station to capture the handshake
After saving the handshake into a cap file, aircrack can be accessed from the main window. The user chooses a .cap file that contain the handshake and a wordlist to perform the bruteforce attack on their desired terminal emulator.
├── LICENSE
├── README.md
├── requirements.txt
├── setup.py
├── start.py
├── aircrack-ng-gui
│ ├── __init__.py
│ └── aircrack-ng-gui.py
└── screenshots
├── 1.png
├── 2.png
├── 3.png
├── 4.png
├── 5.png
├── 6.png
├── 7.png
├── 8.png
└── 9.png