Jump to content
YOUR-AD-HERE
HOSTING
TOOLS
SERVICE

Locked Framework For Wireless Pentesting – SniffAir


itsMe

Recommended Posts

This is the hidden content, please

This is the hidden content, please

Introduction

SniffAir is an open-source wireless security framework which allows you to collect, manage and analyze wireless traffic. It also provides the ability to perform sophisticated wireless attacks. SniffAir takes care of the hassle associated with managing large or multiple pcap files while thoroughly cross-examining and analyzing the traffic, looking for potential security flaws or malicious traffic.

SniffAir: Open-source Wireless Security Framework

Along with the prebuilt queries, SniffAir allows you to create custom queries for analyzing the wireless data which will be stored in the SQL database. These queries will extract data for wireless penetration test reports. The data can also be leveraged in setting up wireless attacks included in SniffAir as modules. It can perfom automated bruteforcing on EAP and PSK networks, fake portal based phishing attack, evil twin attack, etc.

SniffAir Modules:

    Auto EAP – Automated Brute-Force Login Attack Against EAP Networks
    Auto PSK – Automated Brute-Force Passphrase Attack Against PSK Networks
    AP Hunter – Discover Access Point Within a Certain Range Using a Specific Type of Encrpytion
    Captive Portal – Web Based Login Portal to Capture User Entered Credentials (Runs as an OPEN Network)
    Certificate Generator – Generates a Certificate Used by Evil Twin Attacks
    Exporter – Exports Data Stored in a Workspace to a CSV File
    Evil Twin – Creates a Fake Access Point, Clients Connect to Divulging MSCHAP Hashes or Cleartext Passwords
    Handshaker – Parses Database or .pcapdump Files Extracting the Pre-Shared Handshake for Password Guessing (Hashcat or JTR Format)
    Mac Changer – Changes The Mac Address of an Interface
    Probe Packet – Sends Out Deauth Packets Targeting SSID(s)
    Proof Packet – Parses Database or .pcapdump Files Extracting all Packets Related to the Inscope SSDIS
    Hidden SSID – Discovers the Names of HIDDEN SSIDS
    Suspicious AP – Looks for Access Points that: Is On Different Channel, use a Different Vendor or Encrpytion Type Then the Rest of The

Network

    Wigle Search SSID – Queries wigle for SSID (i.e. Bob’s wifi)
    Wigle Search MAC – Queries wigle for all observations of a single mac address

 

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.