Wifi Hack LazyAircrack With Kali
The main purpose of the tool is automating wifi attack. It is a automated bash script for aircrack-ng. Crack the four way handshake and get into the network.
This tool uses 2 methods :
1. Wifi Hacking: Get all the wireless traffic around you listed, select the victim and crack the password using handshake packet. The by default wordlist for cracking passowrd is rockyou.txt from linux, don't forget to replace it with your custom dictionary as per the target or you can still choose to use the default one.
2. Wifi Jammer: It creates denial of service (DoS) condition against any wifi router by continously sending the deauthentication packets resulting in disrupted connection of all connected users to it.
Note :
- To get a handshake, there should be at least one active user using the wifi. By default the script waits 2 mins for handshake packet and checks every 20 seconds if found or not. You can change the waiting time by modifying value of variable "handshakeWait" present at line number 10 in script.
- If the password is not found in default wordlist try using custom wordlist, you can use tools like crunch and cupp for generating wordlist.
- Don't waste your time trying to attack wifi networks without password, since there is no password protection the script will not be able to determine encryption type and will exit with message "Can't find Handshake".
Installing and requirements
- aircrack-ng
- Linux or Unix-based system (Currently tested only on Kali Linux rolling)
- Root access
Installing
Only For Linux :
~ ❯❯❯ git clone https://github.com/3xploitGuy/lazyaircrack.git
~ ❯❯❯ cd lazyaircrack
~ /lazyaircrack ❯❯❯ chmod +x lazyaircrack.sh
~ /lazyaircrack ❯❯❯ ./lazyaircrack.sh
Basics
BSSID: Basic service set identifiers, it recognizes the access point or router uniquely because it has address which creates the wireless network.
Channel: As Wi-Fi data is digital, the signals are transmited and received on a certain frequency also known as channel.
Disclaimer
LazyAircrack is created to help in penetration testing and it's not responsible for any misuse or illegal purposes.
Feel free to discuss any issue or new feature at GitHub's new Discussions.
Pull requests are always welcomed.