Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Airgeddon 8.11 ( captive portals )
#1
Firstly this is documenting the creation of rogueAP / captive portal with airgeddon 8.11

Secondly, this script has been modified accordingly for dhcpd leasing - please check my previous thread on this if you have not: https://xiaopan.co/forums/threads/airged...ses.32383/

Thirdly, due to how potentially powerful this script is and it's functionality I will probably be discontinuing dev/testing with Fluxion for the TinyPaw environment - or at least as an included default tool.

So what is airgeddon?

"
This is a multi-use bash script for Linux systems to audit wireless networks.
"

Quoted and to the point from the project github: https://github.com/v1s1t0r1sh3r3/airgeddon

Wireless devices / chipsets used:

*Multiple wireless devices required*

Alfa AWUS036H *Most likely a knock off*

- Ralink RT2870 / RT3070

TP-Link TL-WN822N

- Realtek RTL8192CU

Eth0 for live internet

Simple steps to recreate:

[Image: screenshot_tinypaw_v1-3_testing_2018-10-...4-png.4306]

Step 1.) Select your primary wlan# device - in my case wlan0 - Ralink RT2870 / RT3070

Step 2.) On the following screen select option# 2. in order to place your wlan# device you've selected into MONITOR mode.

[Image: screenshot_tinypaw_v1-3_testing_2018-10-...9-png.4309]

Step 3.) Select option# 7. "Evil Twin attacks menu"

[Image: screenshot_tinypaw_v1-3_testing_2018-10-...7-png.4310]

Step 4.) Select option# 9. "Evil Twin AP attack with captive portal" - from the list of Evil Twin attacks options.

[Image: screenshot_tinypaw_v1-3_testing_2018-10-...2-png.4311]

Step 5.) Select your secondary wlan# device - in my case wlan1 - Realtek RTL8192CU

Step 6.) Press [Enter] to allow airgeddon to place your secondary wlan# device into MONITOR mode.

[Image: screenshot_tinypaw_v1-3_testing_2018-10-...1-png.4312]

Step 7.) You will be prompted to use an interface with internet access - in this case you will select "Y" for yes since 'dnsspoof' is not included at this time.

[Image: screenshot_tinypaw_v1-3_testing_2018-10-...8-png.4313]

Step 8.) You will be prompted to select the interface with live internet access - in my case this is eth0.

[Image: screenshot_tinypaw_v1-3_testing_2018-10-...7-png.4314]

Step 9.) Will all options / arguments in place thus far press [Enter] for airgeddon to "search" for available networks within range. Up to your preference how long you allow for "searching" I generally give between 30sec to 1min.

[Image: screenshot_tinypaw_v1-3_testing_2018-10-...5-png.4315]

Step 10.) Once you feel you've allowed enough time for "searching" press "cntl+c" to halt network "searching" and generate the list of available "target" networks.

Step 11.) Select the network that you wish to test against - in my case my wireless AP is option# 9.

[Image: screenshot_tinypaw_v1-3_testing_2018-10-...3-png.4316]

Step 12.) The next options menu for our attack prompts you to select the method of deauth you'd like to deploy - in my case I generally use and have the most success with "Deauth aireplay attack" or option# 2. from the options menu.

[Image: screenshot_tinypaw_v1-3_testing_2018-10-...1-png.4317]

Step 13.) Once your preferred deauth method is selected - as stated above i've selected option# 2. you will be prompted whether or not to enable "DoS pursuit mode" I do - so I enter "y"

[Image: screenshot_tinypaw_v1-3_testing_2018-10-...5-png.4318]

Step 14.) Next you will be prompted as to whether or not spoof your MAC address - again I do so I enter "y"

[Image: screenshot_tinypaw_v1-3_testing_2018-10-...6-png.4319]

Step 15.) Next you will be prompted as to whether or not you've obtained a usable handshake for the "target" AP that you've selected - for sake of this being even longer or going into the optional ways you may have obtained it - I have entered "n"

[Image: screenshot_tinypaw_v1-3_testing_2018-10-...5-png.4320]

Step 16.) Since we've entered "n" airgeddon will deploy the deauth method previous selected to capture a usable handshake - in my case I selected to use the "Deauth aireplay attack" method.

Step 17.) As you can see in the upper right of my "capture handshake" window there was a successful WPA handshake captured.

[Image: screenshot_tinypaw_v1-3_testing_2018-10-...0-png.4321]

Step 18.) Next you will be prompted with "Congratulations!" on your capture followed by where you should store your handshake capture *.cap file - press [Enter] for default unless you know what you are doing.

[Image: screenshot_tinypaw_v1-3_testing_2018-10-...8-png.4322]

Step 19.) Next you will be prompted with the language settings airegeddon will use for your captive portal - in my case English - so i've selected option# 1.

[Image: screenshot_tinypaw_v1-3_testing_2018-10-...6-png.4323]

Step 20.) Airgeddon will now launch your captive portal attack along with every necessary service window such as AP, DHCP, Webserver, etc..

Step 21.) As you can see from within the "control" window in the upper right on my screen it has captured "1" attempt for login - password "toofakeforyou"

*Please view following images to see the "rogue" android system alert / login generated - up to you to determine how "fake" it looks - they all do but whatever*


[Image: screenshot_20181019-100813-png.4324]

[Image: screenshot_20181019-100855-png.4326]

Originally posted on the Xiaopan OS forum: https://xiaopan.co/forums/threads/airged...als.32912/
Reply
#2
add DNS Spoof can be fine
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)