This repository has been archived on 2025-04-28. You can view files and clone it, but cannot push or open issues or pull requests.
gensec-westgate-djw2/hw6
David Westgate 3759cb2709 almost works
2024-05-23 16:21:10 -07:00
..
.env.example add readme, env.example 2024-05-18 11:59:53 -07:00
app.py almost works 2024-05-23 16:21:10 -07:00
README.md some improvement to tools 2024-05-23 12:00:52 -07:00
requirements.txt add iw took for recon 2024-05-22 21:48:40 -07:00
screencast_url.txt initial commit for hw6 2024-05-18 11:58:37 -07:00
tools.py almost works 2024-05-23 16:21:10 -07:00

David Westgate 24 May 2024

HW6 for gensec

This LLM agent application is a tool suite which intends to help with reconnissance and penetration testing of wifi networks using the radio on the local machine.

Prerequisites

This application assumes you are running a real linux system, with a wifi radio properly installed and working. It also assumes you have the aircrack-ng toolsuite installed (common on kali systems).

The Cracking Wifi guide provided by Professor Kevin McGrath serves as an inpiration for this application.

Note: This application is for penetration testing only on network for which you are authorized to perform suchs tests. Use of this application on any other networks may be illegal.

Setup + Run

Install python3, then

cd hw6
pip install -r requirements.txt
cp .env.example .env #fill in env file with key
mkdir dumps
mkdir wordlist
python3 app.py

Download word lists for cracking

curl -o wordlist/rockyou.txt https://github.com/brannondorsey/naive-hashcat/releases/download/data/rockyou.txt

Test

For this test:

  • Ensure you have a wifi network running and reachable from your computer with the name NetSec
  • Ensure it has a password found in the wordlist dictionary
  • Ensure a client device is connected

Find the password of the NetSec wifi network