evilsocket / pwnagotchi

(⌐■_■) - Deep Reinforcement Learning instrumenting bettercap for WiFi pwning.
https://pwnagotchi.ai/
Other
7.73k stars 1.15k forks source link

Much needed plugins and features. My experience with Pwnagotchi. #780

Open CyrisXD opened 4 years ago

CyrisXD commented 4 years ago

Firstly let me say, this is an amazing little device and is super fun to play with. However considering it's nature it's a very "noisy" device and approach.

 

As we go about our lives we're often taking the same routes to get somewhere, or going into corporate settings, cities etc... By doing this we are capturing an enormous amount of handshakes, but here's the problem.

 

The Pwnagotchi can and will constantly deauth clients even if a handshake was already captured. It will also keep associating to the same networks over and over again and each time it captures the handshake or PMKID for that SSID it overwrites the file.

 

It's essentially creating a very noticeable attack being client side. Think of devices that are streaming content like a Chromecast, as soon as it looses connection the streaming stops and shows an error. If this repeatedly happens for someone they are going to know something is up.

 

There's a few features I wish the Pwnagotchi had, that maybe some plugin developers can work on.

 

 

I'd be interested in hearing your thoughts. Projects like this make me wish I learned Python instead of taking the Javascript route, otherwise I'd be building all these.

 

A big thank you to @evilsocket for this project and I can't wait to see what it develops into.

 

Cheers

virtadpt commented 4 years ago

Is there a design reason that gpsd doesn't appear to be an option?

Junohea commented 4 years ago

For these 2 requests

  • Pwnagotchi should automatically whitelist SSID's once a complete handshake has been captured.
  • It should be more clear what type of info was captured in the PCAP, often running the conversion tools I don’t easily know which one to use. If the PCAP has the PKMID or a handshake. Append capture file name with capture type, PMKID or HS. ex. “MyWiFi-as2X2-PMKID.pcap”.

I started a plugin to help with hash/handshake related validation, check it out here Every time a new packet is added to a pcap it tries to extract a PMKID & EAPOL hash from it, then write that to a file. Those written files (which indicate a "complete handshake") could be leveraged as a check. I'll look into what i could add that might help, but it would likely be a toggle that the user would enable to say "yes please add these to a the whitelist". I just dont know the limitations yet, like would the config need to be reloaded to take effect and how cumbersome the appending to the whitelist is.

The only downside is, once you capture enough and start whitelisting a network, if they change the network's password you won't continue to get deauth packets without removing the network from the whitelist (although you would still capture PMKIDs).

qkum commented 3 years ago

For these 2 requests

  • Pwnagotchi should automatically whitelist SSID's once a complete handshake has been captured.
  • It should be more clear what type of info was captured in the PCAP, often running the conversion tools I don’t easily know which one to use. If the PCAP has the PKMID or a handshake. Append capture file name with capture type, PMKID or HS. ex. “MyWiFi-as2X2-PMKID.pcap”.

I started a plugin to help with hash/handshake related validation, check it out here Every time a new packet is added to a pcap it tries to extract a PMKID & EAPOL hash from it, then write that to a file. Those written files (which indicate a "complete handshake") could be leveraged as a check. I'll look into what i could add that might help, but it would likely be a toggle that the user would enable to say "yes please add these to a the whitelist". I just dont know the limitations yet, like would the config need to be reloaded to take effect and how cumbersome the appending to the whitelist is.

The only downside is, once you capture enough and start whitelisting a network, if they change the network's password you won't continue to get deauth packets without removing the network from the whitelist (although you would still capture PMKIDs).

People never change the password.

Only companies with a professional IT department change passwords maybe once a year.

I'm yet to ever irl see a wifi password get changed.

Schools, gymnasiums, universities, small companies...never.

It never changes after the day it is first set.