PK!D.^pyrcrack/__init__.py"""pyrcrack. Aircrack-NG python bindings """ import subprocess from .aircrack import AircrackNg # noqa from .airdecap import AirdecapNg # noqa from .aireplay import AireplayNg # noqa from .airmon import AirmonNg # noqa from .airbase import AirbaseNg # noqa from .airdecloack import AirdecloackNg # noqa from .airodump import AirodumpNg # noqa def check(): """Check if aircrack-ng is compatible.""" assert '1.3' in subprocess.check_output(['aircrack-ng', '-v']) PK!5ݹ pyrcrack/airbase.py"""Airbase-ng.""" from .executor import ExecutorHelper class AirbaseNg(ExecutorHelper): """Airbase-ng 1.3 - (C) 2008-2018 Thomas d'Otreppe Original work: Martin Beck https://www.aircrack-ng.org Usage: airbase-ng Options: -a : set Access Point MAC address -i : capture packets from this interface -w : use this WEP key to en-/decrypt packets -h : source mac for MITM mode -f : disallow specified client MACs (default: allow) -W 0|1 : [don't] set WEP flag in beacons 0|1 (default: auto) -q : quiet (do not print statistics) -v : verbose (print more messages) -A : Ad-Hoc Mode (allows other clients to peer) -Y : (in|out|both) external packet processing -c : sets the channel the AP is running on -X : hidden ESSID -s : force shared key authentication (default: auto) -S : set shared key challenge length (default: 128) -L : Caffe-Latte WEP attack -N : cfrag WEP attack (recommended) -x : number of packets per second (default: 100) -y : disables responses to broadcast probes -0 : set all WPA,WEP,open tags. -z : sets WPA1 tags. -Z : same as -z, but for WPA2 -V : fake EAPOL 1=MD5 2=SHA1 3=auto -F : write all sent and received frames into pcap file -P : respond to all probes, even when specifying ESSIDs -I : sets the beacon interval value in ms -C : enables beaconing of probed ESSID values -n : User specified ANonce when doing the 4-way handshake --bssid : BSSID to filter/use --bssids : read a list of BSSIDs out of that file --client : MAC of client to filter --clients : read a list of MACs out of that file --essid : specify a single ESSID (default: default) --essids : read a list of ESSIDs out of that file --help : Displays this usage screen """ command = 'airbase-ng' requires_tempfile = False requires_tempdir = False PK!Υt> > pyrcrack/aircrack.py"""Aircrack-ng.""" from .executor import ExecutorHelper class AircrackNg(ExecutorHelper): """ Aircrack-ng - (C) 2006-2018 Thomas d'Otreppe https://www.aircrack-ng.org Usage: aircrack-ng [options] ... Options: -a : force attack mode (1/WEP, 2/WPA-PSK) -e : target selection: network identifier -b : target selection: access point's MAC -p : # of CPU to use (default: all CPUs) -q : enable quiet mode (no status output) -C : merge the given APs to a virtual one -l : write key to file. Overwrites file. -c : search alpha-numeric characters only -t : search binary coded decimal chr only -h : search the numeric key for Fritz!BOX -d : use masking of the key (A1:XX:CF:YY) -m : MAC address to filter usable packets -n : WEP key length : 64/128/152/256/512 -i : WEP key index (1 to 4), default: any -f : bruteforce fudge factor, default: 2 -k : disable one attack method (1 to 17) -x or -x0 : disable bruteforce for last keybytes -x1 : last keybyte bruteforcing (default) -x2 : enable last 2 keybytes bruteforcing -X : disable bruteforce multithreading -y : experimental single bruteforce mode -K : use only old KoreK attacks (pre-PTW) -s : show the key in ASCII while cracking -M : specify maximum number of IVs to use -D : WEP decloak, skips broken keystreams -P : PTW debug: 1: disable Klein, 2: PTW -1 : run only 1 try to crack key with PTW -w : path to wordlist(s) filename(s) -N : path to new session filename -R : path to existing session filename -E : create EWSA Project file v3 -j : create Hashcat v3.6+ file (HCCAPX) -J : create Hashcat file (HCCAP) -S : WPA cracking speed test -Z : WPA cracking speed test length of execution. -r : path to airolib-ng database (Cannot be used with -w) --simd-list : Show a list of the available SIMD architectures --simd=