Airscript-ng is a modular, object-oriented framework written in Python3 to automate the process of performing basic penetration-testing on a wireless network. The goal here is not to compete with existing tools or scripts, but to provide as much functionality and simplicity to the end user as possible, so that someone with no previous experience can use a WiFi-cracking tool such as aircrack-ng or reaver. As long as you know some of the general theory behind cracking WPA2 or WPS, you will be able to use this script with ease.
In addition to allowing a user to capture a handshake, this script can host a basic Evil-Twin wireless AP and crack a WPA2 handshake using your GPU with Hashcat. see https://hashcat.net/hashcat/.
- Some familiarity with the Linux command line (e.g. filesystem navigation)
- General overview of how WiFi hacking works.
- The APT package manager (Must be able to install packages and have appropriate repository lists)
- The bash shell (version 4.2+ is preferred)
- A stable internet connection (To fetch dependencies and updates)
- A Debian based distro. (Tested on: Kali Linux 2018.2/Ubuntu 16.04.04 LTS)
- Root access. Otherwise the program will not work.
- A WiFi-card/chipset that is capable of supporting monitor mode. (see: https://www.aircrack-ng.org/doku.php?id=compatible_cards)
- Wireless interface names must start with "wl". E.g. "wlan1" or "wlxxxx" (Custom interface names are not supported)
- Drivers capable of running in promiscuous monitor mode/packet injection mode.
- A x86_64 or AMD64 (64 bit) processor. (32bit will work to an extent)
- 300-500MiB free space (For caching and storing wordlists)
- (Optional) A hashcat supported GPU, with appropriate drivers installed.
- (Optional) A second WiFi card, needed to create a Evil-Twin/Fake-AP. This doesn't need monitor mode or packet injection.
$ sudo chmod +x ./setup.sh
$ sudo ./setup.sh
$ sudo ./airscript-ng.py
The rest is self explainatory once run, choose your attack option from the menu and you are good to go! Anyone can use this script to pentest a wireless network, it really is that simple to use. Try it out!
Additonal note: Airscript-ng is in active development. If you're going to fork this project, please ensure to keep checking back, as your fork may be outdated. Any contributions are absolutely welcome, please create a pull request.
How do you update this script? just run it and type 5
in the menu. Want to update manually? Simply git stash
the changes and git pull
the new additions.
- Make a basic python script
- Make and integrate similar script for reaver/other-tools [Reaver/Pixie Dust added 11/06/17]
- Add option to resolve dependencies [Added 17/06/17]
- Add option to create captive portal/Evil-twin AP [Added 24/08/2017]
- Add option to crack existing .cap files using hashcat/GPU/CPU/Aircrack [Added 24/08/2017]
- Improve menu layout [Improved 30/9/2017]
- Add options to install opencl-runtime for hashcat [Added 30/9/2017]
- Add support for Hostapd [Added 27/10/2017]
- Add Airodump-ng CSV files support [Added 16/11/2017]
- Make code more efficient [Improved 20/06/2018]
- Add support for GENPMK/CoWPAtty [Coming soon]
- Add FHS support/compliancy
- Add support for MDK3
- Design and build a GUI [Help needed]
Title Menu Aircrack-ng Reaver Fake AP MITM Crack Handshake
Thanks to Joshua. for extensively testing it on his machine! Thanks to TomHulmeUK for helping with testing! Project inspired by Airgeddon and Fluxion