Langsung ke konten utama

How Cracking Wi-Fi For Android.

KitPloit - PenTest Tools for your Security Arsenal ☣

Hijacker v1.3 - All-in-One Wi-Fi Cracking Tools for Android
1:46 PM | POST SPONSORED BY FARADAYSEC | MULTIUSER PENTEST ENVIRONMENT
LYDECKER BLACK
   
 

Hijacker is a Graphical User Interface for the penetration testing tools Aircrack-ng, Airodump-ng, MDK3 and Reaver. It offers a simple and easy UI to use these tools without typing commands in a console and copy&pasting MAC addresses.
This application requires an ARM android device with a wireless adapter that supports Monitor Mode. A few android devices do, but none of them natively. This means that you will need a custom firmware. Nexus 5 and any other device that uses the BCM4339 chipset (MSM8974, such as Xperia Z2, LG G2 etc) will work with Nexmon (it also supports some other chipsets). Devices that use BCM4330 can use bcmon. An alternative would be to use an external adapter that supports monitor mode in Android with an OTG cable.
The required tools are included for armv7l and aarch64 devices as of version 1.1. The Nexmon driver and management utility for BCM4339 are also included.
Root is also necessary, as these tools need root to work.

Features

Information Gathering
View a list of access points and stations (clients) around you (even hidden ones)
View the activity of a specific network (by measuring beacons and data packets) and its clients
Statistics about access points and stations
See the manufacturer of a device (AP or station) from the OUI database
See the signal power of devices and filter the ones that are closer to you
Save captured packets in .cap file

Attacks
Deauthenticate all the clients of a network (either targeting each one (effective) or without specific target)
Deauthenticate a specific client from the network it's connected
MDK3 Beacon Flooding with custom options and SSID list
MDK3 Authentication DoS for a specific network or to everyone
Capture a WPA handshake or gather IVs to crack a WEP network
Reaver WPS cracking (pixie-dust attack using NetHunter chroot and external adapter)

Other
Leave the app running in the background, optionally with a notification
Copy commands or MAC addresses to clipboard
Includes the required tools, no need for manual installation
Includes the nexmon driver and management utility for BCM4339 devices
Set commands to enable and disable monitor mode automatically
Crack .cap files with a custom wordlist
Create custom actions and run them on an access point or a client easily
Sort and filter Access Points with many parameters
Export all the gathered information to a file
Add an alias to a device (by MAC) for easier identification

Screenshots

     

Installation
Make sure:
you are on Android 5+
you are rooted (SuperSU is required, if you are on CM/LineageOS install SuperSU)
have a firmware to support Monitor Mode on your wireless interface

Download the latest version here.
When you run Hijacker for the first time, you will be asked whether you want to install the nexmon firmware or go to home screen. If you have installed your firmware or use an external adapter, you can just go to the home screen. Otherwise, click 'Install Nexmon' and follow the instructions. Keep in mind that on some devices, changing files in /system might trigger an Android security feature and your system partition will be restored when you reboot. After installing the firmware you will land on the home screen and airodump will start. Make sure you have enabled your WiFi and it's in monitor mode.

Troubleshooting
This app is designed and tested for ARM devices. All the binaries included are compiled for that architecture and will not work on anything else. You can check by going to settings: if you have the option to install nexmon, then you are on the correct architecture, otherwise you will have to install all the tools manually (busybox, aircrack-ng suite, mdk3, reaver, wireless tools, libfakeioctl.so library) and set the 'Prefix' option for the tools to preload the library they need.
In settings, there is an option to test the tools. If something fails, then you can click 'Copy test command' and select the tool that fails. This will copy a test command to your clipboard, which you can run in a terminal and see what's wrong. If all the tests pass and you still have a problem, feel free to open an issue here to fix it, or use the 'Send feedback' feature of the app in settings.
If the app happens to crash, a new activity will start which will generate a report in your external storage and give you the option to send it directly or by email. I suggest you do that, and if you are worried about what will be sent you can check it out yourself, it's just a txt file in your external storage directory. The part with the most important information is shown in the activity.
Please do not report bugs for devices that are not supported or when you are using an outdated version.
Keep in mind that Hijacker is just a GUI for these tools. The way it runs the tools is fairly simple, and if all the tests pass and you are in monitor mode, you should be getting the results you want. Also keep in mind that these are AUDITING tools. This means that they are used to TEST the integrity of your network, so there is a chance (and you should hope for it) that the attacks don't work on your network. It's not the app's fault, it's actually something to be happy about (given that this means that your network is safe). However, if an attack works when you type a command in a terminal, but not with the app, feel free to post here to resolve the issue. This app is still under development so bugs are to be expected.

Warning

Legal
It is highly illegal to use this application against networks for which you don't have permission. You can use it only on YOUR network or a network that you are authorized to. Using a software that uses a network adapter in promiscuous mode may be considered illegal even without actively using it against someone, and don't think for a second it's untracable. I am not responsible for how you use this application and any damages you may cause.

Device
The app gives you the option to install the nexmon firmware on your device. Even though the app performs a chipset check, you have the option to override it, if you believe that your device has the BCM4339 wireless adapter. However, installing a custom firmware intended for BCM4339 on a different chipset can possibly damage your device (and I mean hardware, not something that is fixable with factory reset). I am not responsible for any damage caused to your device by this software.

Download Hijacker

TAGS
AIRCRACK-NG X AIRODUMP-NG X ANDROID X ARM X CRACKING X FIRMWARE X HIDDEN X HIJACKER X MAC X MDK3 X NETHUNTER X NEXUS X REAVER X TESTING X WEP X WIFI X WIRELESS X WPA X WPS  Facebook    



Hijacker v1.3 - All-in-One Wi-Fi Cracking Tools for Android
Reaver - Attack against Wi-Fi Protected Setup (WPS)
lscript - This script will make your life easier, and of course faster
NEXT
You are viewing Most Recent Post
PREVIOUS
dorkbot - Scan Google Search Results for Vulnerabilities
COMMENTSFACEBOOKDISQUS


FOLLOW US!
         

Your Email
Subscribe to our Newsletter


POPULAR
Yuki Chan - Automate Pentest Tool
Yuki Chan - Automate Pentest Tool
The Yuki Chan is an Automated Penetration Testing tool this tool will auditing all standard security test method for you.
OWASP ZSC - Shellcode/Obfuscate Code Generator
OWASP ZSC - Shellcode/Obfuscate Code Generator
OWASP ZSC is an open source software in Python language which lets you generate customized shellcodes and convert scripts to an obf...
Mr.SIP - SIP-Based Audit and Attack Tool
Mr.SIP - SIP-Based Audit and Attack Tool
Mr.SIP is a tool developed to audit and simulate SIP-based attacks. Originally it was developed to be used in academic work to help develo...
Hijacker v1.3 - All-in-One Wi-Fi Cracking Tools for Android
Hijacker v1.3 - All-in-One Wi-Fi Cracking Tools for Android
Hijacker is a Graphical User Interface for the penetration testing tools Aircrack-ng , Airodump-ng , MDK3 and Reaver . It offers a si...
LaZagne v2.2 - Credentials Recovery Project
LaZagne v2.2 - Credentials Recovery Project
The LaZagne project is an open source application used to retrieve lots of passwords stored on a local computer. Each software stores ...
LAST EXPLOITS
STOCK PHOTO SELLING 1.0 - SQL INJECTION
DISK PULSE ENTERPRISE 9.9.16 - GET BUFFER OVERFLOW (METASPLOIT)
MICROSOFT EDGE - CHAKRA INCORRECTLY PARSES OBJECT PATTERNS
LINUX KERNEL <= 4.13.1 - BLUETOOTH BUFFER OVERFLOW (POC)
MICROSOFT EDGE CHAKRA - DEFERRED PARSING MAKES WRONG SCOPES
MICROSOFT EDGE CHAKRA - 'PARSER::PARSECATCH' DOES NOT HANDLE 'EVAL'
MICROSOFT EDGE CHAKRA - 'JAVASCRIPTFUNCTION::REPARSEASMJSMODULE' INCORRECTLY RE-PARSES
PHPMYFAQ 2.9.8 - CROSS-SITE SCRIPTING
DISK PULSE ENTERPRISE 9.9.16 GET BUFFER OVERFLOW
BLOG ARCHIVE
▼  2017 (345)
▼  September (39)
Hijacker v1.3 - All-in-One Wi-Fi Cracking Tools fo...
dorkbot - Scan Google Search Results for Vulnerabi...
dcrawl - Simple, But Smart, Multi-Threaded Web Cra...
Pharos - Static Binary Analysis Framework
outis - Custom Remote Administration Tool (RAT)
dnsenum - Multithreaded perl script to enumerate D...
Inventus - A Spider Designed To Find Subdomains Of...
Reaver - Attack against Wi-Fi Protected Setup (WPS...
LaZagne v2.2 - Credentials Recovery Project
Yuki Chan - Automate Pentest Tool
OWASP ZSC - Shellcode/Obfuscate Code Generator
Mr.SIP - SIP-Based Audit and Attack Tool
Crowbar - Brute Forcing Tool (SSH, OpenVPN, RDP, V...
Spaghetti v0.1.1 - Web Application Security Scanne...
MSFPC - MSFvenom Payload Creator
raven - Linkedin Information Gathering Tool
pbscan - Faster And More Efficient Stateless SYN S...
LiMEaide - Tool to remotely dump RAM of a Linux cl...
theZoo - A repository of LIVE malwares for your ow...
DGA-Detection - DGA Domain Detection using Bigram ...
NorkNork - Powershell Empire Persistence Finder
Lynis 2.5.5 - Security Auditing Tool for Unix/Linu...
CrackLord - Queue and Resource System For Cracking...
idb - Tool to simplify some common tasks for iOS p...
Vision2 - Nmap's XML result parse and NVD's CPE co...
XFLTReaT - Tunnelling Framework
DKMC - Malicious Payload Evasion Tool
PiFinger - Searches For Wifi-Pineapple Traces And ...
fses - Python Library To Scrap Url'S From Search E...
NMapGUI - Advanced Graphical User Interface for NM...
Python Taint - A Static Analysis Tool for Detectin...
UniByAv - Shellcode Obfuscator Anti-Virus Friendly...
Luckystrike - A PowerShell based utility for the c...
Demiguise - HTA Encryption Tool for RedTeams
D0xk1t - Web-based OSINT and Active Reconaissance ...
sdnpwn - An SDN Penetration Testing Toolkit
WSSiP - Application for capturing, modifying and s...
Tulpar - Web Vulnerability Scanner
BlackArch Linux v2017.08.30 - Penetration Testing ...
►  August (62)
►  July (52)
►  June (34)
►  May (32)
►  April (33)
►  March (34)
►  February (28)
►  January (31)
►  2016 (337)
►  2015 (301)
►  2014 (438)
►  2013 (411)
►  2012 (70)
         

Your Email
Subscribe to our Newsletter

CONTACT FORM
Name

Email *

Message *

Send
COPYRIGHT © 2017 KITPLOIT - PENTEST TOOLS FOR YOUR SECURITY ARSENAL ☣

Komentar