/Wireless_peeker

Tool to crack wireless encryption (WPA / WPA2) base on C99

Primary LanguageCBSD 2-Clause "Simplified" LicenseBSD-2-Clause

Wirelss peeker

License

Introduction

In the wireless generation, traffic was transmited via air, it mask more easy to capture those packet.
However, according to IEEE802.11i, data type packet was encrypted by WPA/ WPA2 encryption.
If we want to peek the plaintext of those encrypted traffic, we should capture 4-way handshake and calculate the correct PTK.

Currently there are the following methods can crack WPA2 encryption

  • Dictionary attack
  • KRACK
    key reinstall loophole was fixed after hostaps2.8 or abvoe.
  • Using PMKID

For simplicity, wireless peeker used Dictionary attack to get the PTK between AP and victim.
However, Simplicity means stupid, this attack should take a lot of time to test all password in dictionary.

All decrypted taffic will be storaged on pcapng format file by sprcify file name with -w flag.

How to Build

  • Modify cross item in Makefile to cross-compile if you need.
  • Just type Make

Binary

  • MITM:
    The main process which can crash wpa2 password, calculate ptk, decrypte wireless packet and store those packet.
  • MITM_cil:
    The process which can interaction with MITM process, like set ap and victim you want to hack, report some information of network...

Demo

Voide_link

This project just used to show how attack work, please do not use it to do anything illegel.