42 lines
1.7 KiB
Markdown
42 lines
1.7 KiB
Markdown
###### David Westgate 24 May 2024
|
|
## HW6 for gensec
|
|
This LLM agent application is a tool suite which intends to help with reconnissance and penetration testing of wifi networks using the radio on the local machine.
|
|
|
|
## Prerequisites
|
|
This application assumes you are running a real linux system, with a wifi radio properly installed and working. It also assumes you have the [aircrack-ng toolsuite](https://www.aircrack-ng.org/) installed (common on kali systems).
|
|
|
|
The [Cracking Wifi guide](https://dkmcgrath.github.io/courses/netsec/crack_wifi.html) provided by Professor Kevin McGrath serves as an inpiration for this application.
|
|
|
|
Note: This application is for penetration testing only on network for which you are authorized to perform suchs tests. Use of this application on any other networks may be illegal.
|
|
|
|
### Setup + Run
|
|
Install python3, then
|
|
```
|
|
cd hw6
|
|
pip install -r requirements.txt
|
|
cp .env.example .env #fill in env file with key
|
|
mkdir dumps
|
|
mkdir wordlist
|
|
python3 app.py
|
|
```
|
|
### Download word lists for cracking
|
|
```
|
|
curl -L -o wordlist/rockyou.txt https://github.com/brannondorsey/naive-hashcat/releases/download/data/rockyou.txt
|
|
```
|
|
|
|
## Example tests
|
|
Here are some tests that can be run testing the various capaibilties of the tools. The last test is intended to be a a complete end-2-end test and is perhaps the most interesting.
|
|
|
|
For these tests, it may be important to:
|
|
* Ensure you have a wifi network running and reachable from your computer with the name NetSec
|
|
* Ensure it has a password found in the wordlist dictionary
|
|
* Ensure a client device is connected
|
|
|
|
*Show clients of the NetSec wifi network*
|
|
|
|
|
|
*Deauth the client 60:3C:EE:54:04:12 from the network with BSSID 28:87:BA:75:7E:93 and capture the handshake*
|
|
|
|
|
|
*Find the password of the NetSec wifi network*
|