Airgeddon framework
POC OF AIRGEDDON FRAMEWORK
Introduction:-
Airgeddon is a automated tools by which we can crack wifi password.
Lab environment:-
Atacker’s Operating system:-linux kali 4.13.0-kali-amd64
Wifi adapter:-TP-Link TL-WN727N 150Mbps Wireless N USB Adapter
Framework:- airgeddon
Step 1:-
Copy the github link(https://github.com/v1s1t0r1sh3r3/airgeddon) and clone it in the desktop.
Step 2:-
Then i check the permission of all the file inside the airgedden i found that airgedden is not a executable file.
Step 3:-
Then change the permission of airgeddon.sh form -rw-r--r-- to -rwxrwxrwx by typing chmod 777 airgeddon.sh
Step 4:-
Connect wifi adoptar and Run airgeddon.sh.We have the framework in front of us.
Step 5:-
Then check the requirement what this script need for running this script.there is some error show in this script but we don't want any package for cracking the password so hit enter do ahead. 
Step 6:-
Then select the interface to work with. We will work with wlan0 which is option 2.
Steps 7:-
Then put the wifi adapter in monitor mode which is in option 2. Then type 2 and hit enter. 
Steps 8:-
After putting the adopter in the monitor mode then we will go for the handshake tools menu.which is in menu 5.then type 5 and hit enter.
Steps 9:-
Then we go for the capturing handshake which is in option 5 then type 5 and hit enter.
Steps 10:-
Then its starts monitoring the access point and list all the access point within the range of wifi adapter.
Steps 11:-
Then we have list of all access point and select the target in which we will do password cracking.
Steps 12 :-
After selecting the target we will choose the option 1.then this tool automatically send the deauthentication packets to the clients which is connect to the access point(target).
Steps 13:-
After deauthenticate the client and client automatically connect to the same access(target) point when client reconnect to the access point tool capture the handshake.
Steps 14:-
After capturing the handshake.This handshake by default save in the root directory
Steps 15:-
Then exit the tool. And start brute forcing the handshake file with the help of rockyou.txt Or you can create your own wordlist for complicated password and brute forcing the handshake file which you capture.
After brute forcing the handshake file we get the password that is 123456789.
Comments
Post a Comment