Wednesday, April 18, 2012

WEP and WPA/WPA2 cracking script


This is my first release and is written using python. I am well aware there are a few automated WEP cracking scripts out there. I have found that most scripts were meant for people with general knowledge of wifi cracking.
When I wrote the script I kept in mind that not all people who tests networks or deal with network security are familiar with how to crack wifi passwords. I tried to make my script as interactive for the user as possible. I also added protection for every user input to minimize the chance that the user will make any mistakes along the way.

The process is divided into five steps:
  1. Welcome message and interface selection
  2. Wireless network scanning
  3. Target selection
  4. Association with target and injection
  5. Password decryption

This scripts assumes that the user is using Backtrack (GNOME/KDE) and has Aircrack and Reaver installed on his system.
To download Aircrack: http://www.aircrack-ng.org
To download Reaver-wps: http://code.google.com/p/reaver-wps/downloads/list

When you download the script, save it to your home folder where you are root.
To run script, first open terminal and type:
chmod +x squirrel_wifi.py

Then, in Terminal:

./squirrel_wifi.py

From here, just follow the script instructions and GOOD LUCK!!

Some Important notes:

  •  The script will open a few  terminal windows that you should not close until the script is done
  • Wifi password cracking could be a long process depending on the kind of the network (WEP/WPA/WPA2). WEP cracking is usually faster and the success percentage is high. WPA/WPA2 could be a long process ranging between 4-10 hours and sometimes days. In addition, success percentage is not as high as with WEP.
  • The main windows of the script is the first window or tab so you should always return to that window to enter your selections. In addition, the password decryption process will take place in the first window/tab.
  •  The script has the ability to recognize if you already have wireless interfaces in monitor mode and will let you choose whether to use an existing one or create a new one and use it instead.
  • After the scanning stage you will be able to choose whether to hack a WPA/WPA2 using Reaver
  • At the end, you have the option to delete the monitor mode interface you created or if you have more than one, you can delete all of them.
  • The Script will only stop running when either Aircrack or Reaver are done. You can always stop the script at any time using Ctrl+C. In addition, The script kills at the end all the processes it created (network scanning, injection, cracking).
  • Please feel free to write any suggestions or questions to @SECuirrel or here.


Some screen shots:


Welcome Screen

Network scaning

Attack vectors input

Association and packet injection

Data screen. Note that #Data=# IVs

Password decryption screen (will only appear two minutes after association)

Password found! 

Monitor mode interfaces removed. Script is done working.


Feel free to ask and comment.

link for script

Download Script

A big thank you goes to @Secure_ET who inspired me to write this and helped me testing it.
SECuirrel

@SECuirrel


7 comments:

  1. Where do you download the squirrel_wifi.py script. I don't see any link.

    ReplyDelete
    Replies
    1. for some reason the link was removed I put it back
      Sorry for late response

      Delete
  2. Hi there I tried your script but it never stops running airodump scan

    ReplyDelete
    Replies
    1. The scan suppose to run for 18 seconds and then the airodump output should freeze are you using Backtrack?

      Delete
  3. same here. the scan never stops. Using ubuntu

    ReplyDelete
    Replies
    1. Can you try and change your terminal profile
      under title and command, set "When command exits" to Hold the terminal window open

      Delete