Questions tagged [airgeddon]

airgeddon wireless security tool

airgeddon is a multi-use bash script for Linux systems to audit wireless networks.

This tool allows the professional penetration tester to assess the actual security posture of a target wireless environment by using many technologies and attack vectors like: WEP, WPA/WPA2 handshake capture, WPA/WPA2 decrypt attacks, Evil Twin including enterprise attacks, WPS, DoS attacks, etc.

It is already included on so many pentesting Linux distributions and repositories like BlackArch, Parrot Security, Wifislax or ArchStrike.

airgeddon Logo

Github: airgeddon Github

6 questions
3
votes
2 answers

Are Wi-Fi scanning programs reliable?

Recently, I scanned some Wi-Fi networks with wifite tool in Kali. This tool said that one of the available Wi-Fi networks is secured with WPA2. Ten minutes later, I scanned these Wi-Fi networks again. In this scan, wifite said the same network is…
2
votes
0 answers

Airgeddon-ng Handshake fail

I've followed the following instructions below. This is a freshly installed Parrot OS, not using VirtualBox and etc. I am also using Alfa AWUS036NHA wifi adapter. ifconfig sudo airmon-ng start wlan1 (Wlan1 = Alfa wifi adapter) sudo airodump-ng…
loki
  • 21
  • 2
1
vote
1 answer

WPS PIN and key

I was testing how WPS works on my home router and tried to gain access with a tool I found on github called airgeddon. Problem is, I got the PIN down (the PIN I wrote down below is made up, it's actually another one), and I got the key back which is…
1
vote
1 answer

Access point uses different BSSID and deauth attack fails

I'm using airgeddon (https://github.com/v1s1t0r1sh3r3/airgeddon) to perform a deauthentication attack on my wifi network. When i put my wireless interface in monitor mode to scan the network from the outside I found the router's BSSID, which is…
1
vote
1 answer

Network Adapter error on airgeddon

I keep getting an error on airgeddon while using my Alfa AWUS036ACH network adapter (RTL8812AU chipset). I can launch airgeddon successfully with all requisite tools installed, select my wlan0 network, put it into monitor mode then select the Evil…
jh4x
  • 23
  • 7
1
vote
1 answer

Detecting a Pixie Dust attack? How much of a trace does it leave behind?

I've recently been delving more into Wifi security and am starting with Pixie Dust, I've learned about it, mostly how it works (with the pins, being able to crack two halves of the pins and whatnot, not much in-depth, but enough to understand it and…