Skip to content

Latest commit

 

History

History
93 lines (61 loc) · 5.5 KB

README.md

File metadata and controls

93 lines (61 loc) · 5.5 KB

airgeddon-plugins

Plugins for airgeddon tool. Made with love ❤️ by OscarAkaElvis.

airgeddon. Plugins installation

A plugin can be a single .sh file or may contain a more complex structure. To deploy a plugin, you must deploy the .sh file inside your airgeddon's plugins dir. Depending on your Linux distribution it can be in different directories. Usually is at /usr/share/airgeddon or maybe in another location where you did the git clone command. If the plugin has more files like the WPA3 online attack plugin, all the files should be deployed keeping the existing structure. Example:

~/airgeddon# tree
.
├── airgeddon.sh
├── known_pins.db
├── language_strings.sh
└── plugins
    ├── wpa3_online_attack.py
    ├── wpa3_online_attack.sh
    └── wpa_supplicant_binaries
        ├── wpa_supplicant_amd64
        ├── wpa_supplicant_arm64
        ├── wpa_supplicant_armel
        ├── wpa_supplicant_armhf
        └── wpa_supplicant_i386

Plugins system feature is available from airgeddon>=10.0. More information about plugins at Wiki on original airgeddon Github repository.

airgeddon. WPA3 online attack

An airgeddon plugin to perform a dictionary online attack over WPA3 wireless networks.

This plugin is for airgeddon tool. Using a modified and pre-compiled wpa_supplicant binary, the system is able to distinguish AP responses in order to validate if the attack was successful or not. airgeddon is adding a new menu option for this dictionary online attack over WPA3 wireless networks. It works for airgeddon>=11.30.

It is based on the Wacker script. Credits to the author/s: https://github.com/blunderbuss-wctf/wacker. Credits also for The staff of the Ermine tool for their contribution donating free use of their awesome statifier tool used in the WPA3 online attack plugin to make executable portable.

airgeddon. All chars accepted on Captive Portal

An airgeddon plugin to decrease security to accept any char as part of the password for Evil Twin Captive Portal attack.

This plugin is for airgeddon tool. To avoid injections on the Captive Portal, airgeddon by default is filtering some dangerous chars *&/?<> as a part of the password while using Evil Twin Captive Portal attack. That might the attack to fail if the password of the target network is using one of these filtered chars. Using this plugin, any character will be accepted as part of the password.

airgeddon. Realtek chipset fixer

An airgeddon plugin to fix some problematic Realtek chipsets.

This plugin for airgeddon tool is to be used exactly on v10.0. This plugin is not needed if you are using airgeddon v10.01 or higher because since that version, the compatibility problem was already addressed by default in the core source code of airgeddon.

It fixes the non-standard behavior of some drivers for some Realtek chipsets used on many wireless cards.

List of the compatible working cards can be found at airgeddon Wiki here.

List of known chipsets fixed with this plugin

For now, the known list of chipsets that this plugin fixes to be used with airgeddon tool is:

  • Realtek RTL8188EU/S <- present in TP-Link TL-WN722N v2/v3 / Alfa AWUS036NHV (2.4Ghz - USB)
  • Realtek RTL8811AU <- present in some unbranded cheap chinese dongles (2.4Ghz/5Ghz - USB)
  • Realtek RTL8812AU <- present in Alfa AWUS036ACH (2.4Ghz/5Ghz - USB)
  • Realtek RTL8812BU <- present in Comfast CF-913AC (2.4Ghz/5Ghz - USB)
  • Realtek RTL8814AU <- present in TP-LINK Archer T9UH / Alfa AWUS1900 (2.4Ghz/5Ghz - USB)
  • Realtek RTL8821CE <- present in Realtek RTL8821CE card (2.4Ghz/5Ghz - PCIe)

There are more cards and devices using the chipsets listed here. We listed only some examples of cards containing these chipsets.

Which versions was this designed for?

This plugin was designed to be used on airgeddon v10.0 and is not needed if you are using airgeddon v10.01 or higher because since that version, the compatibility problem was already addressed by default in the core source code of airgeddon.

What is fixed using this plugin?

Basically, this fix for the listed Realtek cards the ability to switch mode from monitor to managed and viceversa from airgeddon menus.

Known problems even using the plugin depending on your driver version and Kernel:

  • WPS wash scanning
  • VIF (Virtual Interface) problem. It affects to DoS during Evil Twin attacks (while the interface is splitted into two logical interfaces)

These known problems are not related to airgeddon and can't be fixed on airgeddon's side. They are directly related to driver capabilities so for now they can't be fixed.

VIF (Virtual Interface) compatibility is a hardware problem.

Contact / Improvements / Extension to other Realtek chipsets

If you have any other wireless card with a different Realtek chipset which is also messing up with airgeddon, feel free to contact me by IRC or on #airgeddon channel at Discord. Join clicking on the Public Invitation link.