1 Attachment(s)
handshakeharvest-K1-K2-K2016-4-0.sh has been released for community use.
Musket Teams have voted to release an updated handshakeharvest for community use as of 6 July 2016. Program supports kali 1.10a 2.0 and 2016R.
This script incorporates the additions as provided by MajorTom in this thread. And without his/her input this newer version would not have been written. For MTeams the use of handshakeharvest definitively ends the need to sit in front of computers attempting to collect handshakes. The robotic script easily obtained many .cap files containiing handshakes with little effort from the user.
The program has been tested in Kali 1.10a, 2.0 and 2016R. The slowest computer was used running a persistent usb install of kali2016. All versions were tested using an external AWUSO36H wifi device attached to a 5 meter extension cable to insure the mac changing routines had time to function. All versions ran for 24 hours with no interruption.
MTeams does not support kali-light, luks encryption or ARM.
You can download here thru kali or at:
https://www.datafilehost.com/d/4cf8f4dc
General:
This script is a completely robotic WPA Handshake collector.
Supports a general deauth of all WPA networks found.
Supports specific deauth of clients found associated to target network
Features added at community request.
The ability of error handling during program setup to be turned on or off.
Program Overview
After program setup a scan of all WPA encrypted networks within reception range is conducted and a list of targets made.
Program then enters active deauth phase.
Each target in list is attacked in turn as follows.
Airodump-ng is then started to collect a handshake on channel and bssid of target.
Using aireplay-ng -0 two general deauths are directed at target
If no handshake obtained
Program searches for associated clients
If clients found program attempts to deauth three clients associated to the network. Program selects the top three clients measured by activity and sends two deauth pulses at each network-client pair.
After all targets found in the list have been attacked the program enters a passive phase collecting data.
When passive phase has time expired, program re-scans the area and restarts the active phase.
If a handshake has been collected program ignores that network in any further scans.
Program supports the collection of essidprobes and constructs dictionaries for use in brute forcing a WPA handshake.
Program is time and activity driven. Time of passive scan and activity such as deauth count for aireplay-ng is setup by the user.
MTeams attempted to upload to github and was unable therefore you can download at:
Musket Teams