Skip to content

OscarAkaElvis/airgeddon-plugins

Repository files navigation

airgeddon-plugins

Plugins for airgeddon tool. Made with love ❤️ by OscarAkaElvis.

airgeddon. Plugins installation

A plugin can be a single .sh file or may contain a more complex structure. To deploy a plugin, you must deploy the .sh file inside your airgeddon's plugins dir. Depending on your Linux distribution it can be in different directories. Usually is at /usr/share/airgeddon or maybe in another location where you did the git clone command. If the plugin has more files like the WPA3 online attack plugin, all the files should be deployed keeping the existing structure. Example:

~/airgeddon# tree
.
├── airgeddon.sh
├── known_pins.db
├── language_strings.sh
└── plugins
    ├── allchars_captiveportal.sh <- this is one plugin
    |
    ├── realtek_chipset_fixer.sh <- this is another plugin
    |
    ├── wpa3_cookie_guzzler.py \ <- these two files are another plugin
    ├── wpa3_cookie_guzzler.sh /
    |
    ├── wpa3_online_attack.py     \
    ├── wpa3_online_attack.sh      |
    └── wpa_supplicant_binaries    |
        ├── wpa_supplicant_amd64   | <- all of these files including the dir containing binaries
        ├── wpa_supplicant_arm64   |    are another plugin
        ├── wpa_supplicant_armel   |
        ├── wpa_supplicant_armhf   |
        └── wpa_supplicant_i386   /

Plugins system feature is available from airgeddon>=10.0. More information about plugins at Wiki on original airgeddon GitHub repository.

airgeddon. WPA3 online attack

An airgeddon plugin to perform an online dictionary attack over WPA3 wireless networks.

WPA3 Online Dictionary logo

This plugin is for airgeddon tool. Using a modified and pre-compiled wpa_supplicant binary, the system is able to distinguish AP responses in order to validate if the attack was successful or not. airgeddon is adding a new menu option for this online dictionary attack over WPA3 wireless networks. It works for airgeddon>=11.30.

This plugin requires python>=3.6 to be available on the system.

It is based on the Wacker script. Credits to the authors: https://github.com/blunderbuss-wctf/wacker. Credits also for The staff of the Ermine tool for their contribution donating free use of their awesome statifier tool used in the WPA3 online attack plugin to make executable portable.

airgeddon. WPA3 cookie guzzler

An airgeddon plugin to perform a WPA3 Cookie Guzzler DoS attack.

WPA3 Cookie Guzzler logo

This plugin for airgeddon tool combines a Bash wrapper with a Python helper to run the Cookie Guzzler procedure from the WPA3 attacks menu on airgeddon>=11.61. The attack can leverage a secondary adapter to capture SAE scalar and finite field values automatically or allows entering them manually to reuse previous captures. Once armed, it continuously injects crafted frames to overwhelm the target AP causing Denial of Service (DoS).

The requirements for this plugin are python>=3.6, tshark, and wpa_supplicant to be available on the system.

⚠️ Note: If warnings about deprecated Python features appear at startup, update the libraries: pip install "scapy==2.7.0" "cryptography==46.0.1" This will remove the warning. It will work correctly regardless.

Credits to Nuseo1 for his help researching WPA3 DoS, and to the original authors of the paper available here.

airgeddon. All chars accepted on Captive Portal

An airgeddon plugin to decrease security to accept any char as part of the password for Evil Twin Captive Portal attack.

This plugin is for airgeddon tool. To avoid injections on the Captive Portal, airgeddon by default is filtering some dangerous chars *&/?<> as a part of the password while using Evil Twin Captive Portal attack. That might the attack to fail if the password of the target network is using one of these filtered chars. Using this plugin, any character will be accepted as part of the password.

airgeddon. Realtek chipset fixer

An airgeddon plugin to fix some problematic Realtek chipsets.

This plugin for airgeddon tool is to be used exactly on v10.0. This plugin is not needed if you are using airgeddon v10.01 or higher because since that version, the compatibility problem was already addressed by default in the core source code of airgeddon.

It fixes the non-standard behavior of some drivers for some Realtek chipsets used on many wireless cards.

List of the compatible working cards can be found at airgeddon Wiki here.

List of known chipsets fixed with this plugin

For now, the known list of chipsets that this plugin fixes to be used with airgeddon tool is:

  • Realtek RTL8188EU/S <- present in TP-Link TL-WN722N v2/v3 / Alfa AWUS036NHV (2.4Ghz - USB)
  • Realtek RTL8811AU <- present in some unbranded cheap chinese dongles (2.4Ghz/5Ghz - USB)
  • Realtek RTL8812AU <- present in Alfa AWUS036ACH (2.4Ghz/5Ghz - USB)
  • Realtek RTL8812BU <- present in Comfast CF-913AC (2.4Ghz/5Ghz - USB)
  • Realtek RTL8814AU <- present in TP-LINK Archer T9UH / Alfa AWUS1900 (2.4Ghz/5Ghz - USB)
  • Realtek RTL8821CE <- present in Realtek RTL8821CE card (2.4Ghz/5Ghz - PCIe)

There are more cards and devices using the chipsets listed here. We listed only some examples of cards containing these chipsets.

Which versions was this designed for?

This plugin was designed to be used on airgeddon v10.0 and is not needed if you are using airgeddon v10.01 or higher because since that version, the compatibility problem was already addressed by default in the core source code of airgeddon.

What is fixed using this plugin?

Basically, this fix for the listed Realtek cards the ability to switch mode from monitor to managed and viceversa from airgeddon menus.

Known problems even using the plugin depending on your driver version and Kernel:

  • WPS wash scanning
  • VIF (Virtual Interface) problem. It affects to DoS during Evil Twin attacks (while the interface is split into two logical interfaces)

These known problems are not related to airgeddon and can't be fixed on airgeddon's side. They are directly related to driver capabilities so for now they can't be fixed.

VIF (Virtual Interface) compatibility is a hardware problem.

Contact / Improvements / Extension to other Realtek chipsets

If you have any other wireless card with a different Realtek chipset which is also messing up with airgeddon, feel free to contact me by IRC or on #airgeddon channel at Discord. Join clicking on the Public Invitation link.