This repository has been archived on 2025-04-28. You can view files and clone it, but cannot push or open issues or pull requests.
gensec-westgate-djw2/hw6/README.md
2024-05-23 12:00:52 -07:00

34 lines
1.4 KiB
Markdown

###### David Westgate 24 May 2024
## HW6 for gensec
This LLM agent application is a tool suite which intends to help with reconnissance and penetration testing of wifi networks using the radio on the local machine.
## Prerequisites
This application assumes you are running a real linux system, with a wifi radio properly installed and working. It also assumes you have the [aircrack-ng toolsuite](https://www.aircrack-ng.org/) installed (common on kali systems).
The [Cracking Wifi guide](https://dkmcgrath.github.io/courses/netsec/crack_wifi.html) provided by Professor Kevin McGrath serves as an inpiration for this application.
Note: This application is for penetration testing only on network for which you are authorized to perform suchs tests. Use of this application on any other networks may be illegal.
### Setup + Run
Install python3, then
```
cd hw6
pip install -r requirements.txt
cp .env.example .env #fill in env file with key
mkdir dumps
mkdir wordlist
python3 app.py
```
### Download word lists for cracking
```
curl -o wordlist/rockyou.txt https://github.com/brannondorsey/naive-hashcat/releases/download/data/rockyou.txt
```
## Test
For this test:
* Ensure you have a wifi network running and reachable from your computer with the name NetSec
* Ensure it has a password found in the wordlist dictionary
* Ensure a client device is connected
*Find the password of the NetSec wifi network*