Skip to content
/ WiCC2 Public

Development version of the WiCC2 project, with all upcomming features

License

Notifications You must be signed in to change notification settings

wicc2/WiCC2

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

WiCC 2


WiFi Cracking Camp

GUI tool for wireless WEP and WPA/WPA2 pentesting.

Developed by Pablo Sanz Alguacil and Miguel Yanes Fernández, as the Group Project for 3rd year of the Bachelor of Science in Computing in Digital Forensics and Cyber Security at the Technological University Dublin.




Wireless pentesting tool with functionalities such as password cracking (in WEP and WPA/WPA2 networks), DoS attacks, client de-authentication,and data decryption.

WiCC 2 is the current version under development, updated from the original WiCC project.



Project insight

Tool developed in Python 3.7, developed and tested under Kali Linux and Parrot OS distributions. This tool is a GUI toolkit that integrates different open source tools for wireless pentesting. The utilised tools are the following:

Requirements

You will need to run the application with root privileges, and using some version of Python 3+. Also, you need to have installed aircrack-ng suite, ifconfig and cowpatty, the rest of the tools mentioned in the section Project insight are optional. If any of the mentioned tools is not installed, the application will ask you to automatically install it. Of course, as this is a wireless pentesting tool, you will need some wireless card to perform the scans/attacks. In case you miss some of these requirements, you won't be able to initiate the tool.

Is recommendable to run it on Kali Linux or Parrot OS since both have the required tools preinstalled. Also it is highly recommended to use a wireless card that supports both monitor mode and packet injection. In case your wireless card doesn't support monitor mode, you won't be able to execute the attacks and scans.

What is monitor mode?

Monitor mode, or RFMON (Radio Frequency MONitor) mode, allows a computer with a wireless network interface controller (WNIC) to monitor all traffic received on a wireless channel. Unlike promiscuous mode, which is also used for packet sniffing, monitor mode allows packets to be captured without having to associate with an access point or ad hoc network first. Monitor mode only applies to wireless networks, while promiscuous mode can be used on both wired and wireless networks. Monitor mode is one of the eight modes that 802.11 wireless cards can operate in: Master (acting as an access point), Managed (client, also known as station), Ad hoc, Repeater, Mesh, Wi-Fi Direct, TDLS and Monitor mode.

Usually the wireless adapter is unable to transmit in monitor mode and is restricted to a single wireless channel, though this is dependent on the wireless adapter's driver, its firmware, and features of its chipset. Also, in monitor mode the adapter does not check to see if the cyclic redundancy check (CRC) values are correct for packets captured, so some captured packets may be corrupted.

Installation

To install the tool and all its required software, you need to use the script install.sh. You only need root privileges to execute this script, and it will install all required software, and create all the necessary symbolic links. Once the installation is completed, you can run the program with the command wicc under root privileges.

Usage

The tool is a framework utility, but you need to run it from the command line. To do so, you need to run under root privileges and Python 3+:

$ sudo wicc [options]



There are also some advanced options that you can choose from the command line. These options are originaly meant for debugging purposes, but you may find some of them useful:

  • -a Auto-select the first available network interface.

  • -i Ignore local save files.

  • -p Only basic pop-ups mode.

  • -v Select the verbose level for the output (default: 0, no output)

    • -v Level 1 (basic output)

    • -vv Level 2 (advanced output)

    • -vvv Level 3 (advanced output and executed commands)

You can always view the help with the option --help or -h



attack_wpa_gif

Final release

The version 1.0 includes password cracking (WEP and WPA/WPA2 networks), DoS attacks, client de-authentication, and data decryption funtionalities. If you want to get in contact to notify us about some bugs you encountered, or about some feature you thing could be interesting to add, you can use the contact information showed on our GitHub profiles listed below.

Authors

  • Miguel Yanes Fernández - Project Manager, back-end developer - Github: MiguelYanes
  • Pablo Sanz Alguacil - UX designer, front-end developer, and back-end collaborator - Github: pabloibiza

See also the list of contributors who participated in this project.

Source License

This project is under license GNU GPL 3.0

About

Development version of the WiCC2 project, with all upcomming features

Resources

License

Stars

Watchers

Forks

Packages

No packages published