stryker-project / app

Magic tool for pentest from your android device!
https://strykerdefence.com
262 stars 19 forks source link

Pixie-Dust or any wifi attack is not working #14

Open Prisoner2-6-7 opened 1 month ago

Prisoner2-6-7 commented 1 month ago

P 6-2-7, [17/05/24 3:15 AM] Model:realmeRMX2030 Android: 29 (arm64) App Version: 4.0R 400

============================= [I] Executing command: id [I] Executing command: id [O] uid=0(root) gid=0(root) groups=0(root) context=u:r:magisk:s0 [I] Executing command: chmod 777 -R /data/data/com.zalexdev.stryker/files [I] Checking folder /data/local/stryker/release/sdcard/Stryker [I] Executing command: [ -d /data/local/stryker/release/sdcard/Stryker ] && echo true || echo false [O] false [I] Checking file /sys/module/wlan/parameters/con_mode [I] Executing command: [ -f /sys/module/wlan/parameters/con_mode ] && echo true || echo false [O] true [I] Executing command: cat /proc/cpuinfo | grep "Hardware" | sed "s/^Hardware.: (.)/\1/g" [O] Qualcomm Technologies, Inc SDM665 [I] Checking file /sys/module/wlan/parameters/con_mode [I] Executing command: [ -f /sys/module/wlan/parameters/con_mode ] && echo true || echo false [O] true [I] Executing command: cat /proc/cpuinfo | grep "Hardware" | sed "s/^Hardware.: (.)/\1/g" [O] Qualcomm Technologies, Inc SDM665 [I] Executing command: chmod 777 -R /data/data/com.zalexdev.stryker/files/ [I] Executing command: mkdir /storage/emulated/0//Stryker/ [I] Executing command: mkdir /data/local/stryker [I] Checking folder /data/local/stryker/release/sdcard/Stryker [I] Executing command: [ -d /data/local/stryker/release/sdcard/Stryker ] && echo true || echo false [O] false [I] Executing command: rm -rf /data/local/stryker/release [I] Executing command: rm -rf /storage/emulated/0/Stryker/release [I] Executing command: rm -rf /storage/emulated/0/Download/stryker.apk [I] Executing command: mkdir /storage/emulated/0/Stryker [E] mkdir: '/storage/emulated/0/Stryker': File exists [I] Executing command: mkdir /storage/emulated/0/Stryker/hs [I] Executing command: mkdir /storage/emulated/0/Stryker/captured [I] Executing command: mkdir /storage/emulated/0/Stryker/exploits [I] Executing command: mkdir /storage/emulated/0/Stryker/wordlists [I] Executing command: mkdir /storage/emulated/0/Stryker/reports [I] Executing command: rm -rf /data/data/com.zalexdev.stryker/files/core.tar.gz [I] Checking file /data/data/com.zalexdev.stryker/files/core.tar.gz [I] Executing command: [ -f /data/data/com.zalexdev.stryker/files/core.tar.gz ] && echo true || echo false [O] true [I] Executing command: /data/data/com.zalexdev.stryker/files/busybox tar -xf /data/data/com.zalexdev.stryker/files/core.tar.gz -C /data/local/stryker/ [I] Checking folder /data/local/stryker/release/bin/ [I] Executing command: [ -d /data/local/stryker/release/bin/ ] && echo true || echo false [O] true [I] Executing command: rm -rf /data/data/com.zalexdev.stryker/files/core.tar.gz [I] Executing command: /data/data/com.zalexdev.stryker/files/bootroot [O] [!] Checking chroot environment. [O] Linux [O] [-] FS is NOT all mounted yet. [O] [!] Mounting fs to chroot. [O] [+] created /dev/net/tun [O] [+] mounted /dev [O] [+] mounted /dev/pts [O] [+] mounted /dev/shm [O] [+] mounted /proc [O] [+] mounted /sys [O] [+] mounted /system [O] [+] mounted /sdcard [O] net.ipv4.ip_forward = 1 [O] [+] The Chroot has been started. [E] sysctl: error: 'kernel.shmmax' is an unknown key [I] Checking folder /data/local/stryker/release/sdcard/Stryker [I] Executing command: [ -d /data/local/stryker/release/sdcard/Stryker ] && echo true || echo false [O] true [I] Executing command: rm -rf /sdcard/Stryker/exploits/ [I] Executing command: cp -R /data/data/com.zalexdev.stryker/files/checker.py /data/local/stryker/release/exploits/checker.py [I] Executing command: cp -R /data/local/stryker/release/exploits/ /sdcard/Stryker/exploits [I] Executing command: chmod 777 -R /data/data/com.zalexdev.stryker/files [I] Executing command: echo update > /data/local/stryker/release/4.0 [I] Executing command: rm -rf /sdcard/Stryker/exploits/checker.py

P 6-2-7, [17/05/24 3:15 AM] [I] Executing command: am start -n com.zalexdev.stryker/.MainActivity [O] Starting: Intent { cmp=com.zalexdev.stryker/.MainActivity } [I] Checking file /data/local/stryker/release/4.0 [I] Executing command: [ -f /data/local/stryker/release/4.0 ] && echo true || echo false [O] true [I] Checking folder /data/local/stryker/release/usr [I] Executing command: [ -d /data/local/stryker/release/usr ] && echo true || echo false [O] true [I] Checking folder /data/local/stryker/release/sdcard/Stryker [I] Executing command: [ -d /data/local/stryker/release/sdcard/Stryker ] && echo true || echo false [O] true [I] Executing command: chmod 777 -R /data/data/com.zalexdev.stryker/files [I] Executing command: /data/data/com.zalexdev.stryker/files/sqlite3 /data/adb/magisk.db "SELECT notification FROM policies WHERE package_name='com.zalexdev.stryker';" [I] Checking file /sdcard/Stryker/exploits/checker.py [I] Executing command: [ -f /sdcard/Stryker/exploits/checker.py ] && echo true || echo false [O] false [E] Error: no such column: package_name [I] Executing command: /data/data/com.zalexdev.stryker/files/sqlite3 /data/adb/magisk.db "SELECT notification FROM policies WHERE uid='10227';" [I] Executing command: rm -rf /sdcard/Stryker/exploits/ [O] 1 [I] Executing command: cp -R /data/local/stryker/release/exploits/ /sdcard/Stryker/exploits [I] Executing command: cp -R /data/data/com.zalexdev.stryker/files/checker.py /data/local/stryker/release/exploits/checker.py [I] Executing chroot command: echo -e "SSID: Sheikh khairul\x20" [O] SSID: Sheikh khairul [E] Command: python3 -u /CORE/PixieWps/pixie.py -i wlan0 --pixie-force -K -F -b XX:XX:XX:XX:XX:XX [O] [] Running wpa_supplicant… [O] [] Running wpa_supplicant… [O] [] Trying PIN '12345670'… [O] [] Scanning… [O] [] Associating with AP… [O] [] Scanning… [O] [] Associating with AP… [O] [] Scanning… [O] [] Associating with AP… [O] [+] Associated with XX:XX:XX:XX:XX:XX (ESSID: Masum) [O] [] Scanning… [O] [] Associating with AP… [O] Scan interface is wlan0 [E] Command: python3 -u /CORE/PixieWps/pixie.py -i wlan0 --pixie-force -K -F -b XX:XX:XX:XX:XX:XX [O] [] Running wpa_supplicant… [O] [] Running wpa_supplicant… [O] [] Trying PIN '12345670'… [O] [] Scanning… [O] [] Scanning… [O] [] Associating with AP… [O] [] Scanning… [O] [] Associating with AP… [O] [] Scanning… [O] [] Scanning… [O] [] Associating with AP… [O] [] Scanning… [O] [] Associating with AP… [O] Scan interface is wlan0 [E] Command: python3 -u /CORE/PixieWps/pixie.py -i wlan0 --pixie-force -K -F -b XX:XX:XX:XX:XX:XX [O] [] Running wpa_supplicant… [O] [] Running wpa_supplicant… [O] [] Trying PIN '12345670'… [O] [] Scanning… [O] [] Associating with AP… [O] [] Scanning… [O] [] Associating with AP… [O] [] Scanning… [O] [] Associating with AP… [O] [] Scanning… [O] [*] Associating with AP… [O] Scan interface is wlan0 [E] Command: python3 -u /CORE/PixieWps/pixie.py -i wlan0 --pixie-force -K -F -b XX:XX:XX:XX:XX:XX

The UI is beautiful but the wifi attack is not working

Prisoner2-6-7 commented 1 month ago

Turning on airplane mode did the trick. But deauth is not working ig in snapdragon 665 doesn't support packet injection that's why. But anyway monitor mode worked and I'm happy

Prisoner2-6-7 commented 1 month ago

Is there any list of decides which chip support monitor and packet injection?