Becram / pentoo

Automatically exported from code.google.com/p/pentoo
1 stars 0 forks source link

New tool: airpwn-ng #353

Open GoogleCodeExporter opened 9 years ago

GoogleCodeExporter commented 9 years ago
What: airpwn-ng
  A revamp of the original airpwn project.  Permission has been granted from the original author (toast) for the name use

Located at: https://github.com/stryngs/airpwn-ng

Minimum Requirements:
- Aircrack-ng
- inotify-tools
   - https://github.com/rvoicilas/inotify-tools/wiki
- packit
   - http://packetfactory.openwall.net/projects/packit/
- libpcap
- tcpdump

Summary:
airpwn-ng is able to inject packets into the tcp/ip stream of an http web 
session.  In it's current configuration (bash) it has about a 70% success rate 
on an Intel Pentium N3530 @ 2.16GHz using the Alfa AWUS036h.  airpwn-ng does 
not need to be "connected/associated" with the Access Point for successful 
injection in an Open WiFi scenario.  Once testing has been completed, airpwn-ng 
will transition from bash over to python.

Original issue reported on code.google.com by configit...@gmail.com on 28 Apr 2015 at 2:13

GoogleCodeExporter commented 9 years ago

Original comment by sidhayn on 28 Apr 2015 at 3:32

GoogleCodeExporter commented 9 years ago
I left a message in your github, but I will try here as well.

I am intrested in your project because airpwn is pretty out dated. I am having 
issues figuring out how to copy airpwns ability to replace all .jpegs on a 
page. I do not see how i can tie get/match with just the html inject.

Please help me out, and thank you for all your work.

Original comment by akbal...@gmail.com on 11 Jul 2015 at 5:46

GoogleCodeExporter commented 9 years ago
Hi!

We responded via github.  Do you IRC?  I haven't been steady on IRC in
quite the while, but am HAPPY to hop on and speak to what this tool can and
cannot do for you

Original comment by configit...@gmail.com on 14 Jul 2015 at 5:24