Wireless Tools

From Android Open Pwn Project
Jump to: navigation, search

This page provides information regarding the one touch apps inside the Wireless Tools folder on the AOPP Homescreen

Wireless tools

Airodump

"Airodump-ng is used for packet capturing of raw 802.11 frames and is particularly suitable for collecting WEP IVs (Initialization Vector) for the intent of using them with aircrack-ng. If you have a GPS receiver connected to the computer, airodump-ng is capable of logging the coordinates of the found access points." [1]

Usage

  1. Connect supported external wireless card via OTG cable
  2. Launch Airodump app
  3. Opt into saving logs

Implementation

  1. Prompts user to save logs
  2. Runs command:
  3.     airodump-ng -C0 --manufacturer --gpsd wlan1mon
    

EvilAP

Usage

  1. Connect supported external wireless card via OTG cable
  2. Launch EvilAP app
  3. Choose internet uplink interface
  4. Name the EvilAP
  5. Pick a channel to run AP on
  6. Opt into Karma attack
  7. Watch for connections


Putting interface into monitor mode Next Step Pick uplink interface Next Step Name AP Next Step Pick Channel Next Step Opt into Karma attack Next Step Listening

Other Tools

After setting up EvilAP you will be able to run tools on MITM'd client traffic by running tools on the wlan1 interface.

Note: the current release One Touch apps have an outdated interface selection menu - at0 is the *old* EvilAP interface. The current EvilAP runs on wlan1. This will be corrected soon and we apologize for the inconvenience.

Implementation

DNS Spoof

Spoofs DNS; To be used in conjunction with EvilAP and SET to serve MITM'd victims webpages and control browsing.

Usage

Steps:

  1. Connect supported external wireless card via OTG cable
  2. Launch and set up your EvilAP
  3. Launch DNS Spoof

Launching DNS Spoof Spoofing

Connected clients being spoofed will appear in the DNS Spoof window as

    dns_spoof: A [mail.google.com] spoofed to [192.168.7.1]

Press H to view keyboard shortcuts for interactivity

Help menu

Kismet

Coming soon.

Wifite

"To attack multiple WEP, WPA, and WPS encrypted networks in a row. This tool is customizable to be automated with only a few arguments. Wifite aims to be the “set it and forget it” wireless auditing tool."[2]

Usage

  1. Connect supported external wireless adapter via OTG cable
  2. Launch Wifite app
  3. Ctrl-C to stop scanning once you are satisfied with the networks visible
  4. Choose network(s) to attack
  5. Let Wifite run through its attacks until it ends, you can also stop a specific attack and launch the next by hitting Ctrl-C


Launching Wifite Next Step Scanning Next Step Network selected and all attacks stepped through with Ctrl-C