Learn Wireless Pentesting with Airgeddon on Ubuntu
Download Airgeddon on Ubuntu
Airgeddon is a multi-use bash script for Linux systems to audit wireless networks. It has many features, such as WEP, WPA, WPA2, and WPA3 cracking, evil twin attacks, WPS attacks, enterprise network attacks, and more. In this article, I will show you how to install and use airgeddon on Ubuntu step by step. Let's get started!
download airgeddon ubuntu
What is airgeddon?
Airgeddon is a tool that allows you to perform various security tests on wireless networks. It is written in bash and uses other tools such as aircrack-ng, bettercap, hashcat, hostapd, lighttpd, mdk4, nftables/iptables, and others. Airgeddon can help you to discover vulnerabilities in wireless networks and exploit them.
Features of airgeddon
According to its , airgeddon has the following features:
Interface mode switcher (Monitor-Managed) keeping selection even on interface name changing
DoS over wireless networks using different methods (mdk3, mdk4, aireplay-ng). "DoS Pursuit mode" available to avoid AP channel hopping (available also on DoS performed on Evil Twin attacks)
Full support for 2.4Ghz and 5Ghz bands
Assisted WPA/WPA2 personal networks Handshake file and PMKID capturing
Cleaning and optimizing Handshake captured files
Offline password decrypting on WPA/WPA2 captured files for personal networks (Handshakes and PMKIDs) using dictionary, bruteforce and rule based attacks with aircrack, crunch and hashcat tools.
Enterprise networks captured password decrypting based on john the ripper, crunch, asleap and hashcat tools. GPU support available for hashcat.
WPA3 online dictionary attack (plugin based)
Evil Twin attacks (Rogue AP) - WPA/WPA2/WPA3 Only Rogue/Fake AP mode to sniff using external sniffer (Hostapd + DHCP + DoS)
Simple integrated sniffing (Hostapd + DHCP + DoS + Ettercap)
Integrated sniffing, sslstrip2 (Hostapd + DHCP + DoS + Bettercap)
Integrated sniffing, sslstrip2 and BeEF Browser Exploitation Framework (Hostapd + DHCP + DoS + Bettercap + BeEF)
Captive portal with "DNS blackhole" to capture wifi passwords (Hostapd + DHCP + DoS + Dnsspoff + Lighttpd)
Optional MAC spoofing for all Evil Twin attacks
Optional advanced captive portal including vendor logos
WPS features
WPS scanning (wash).
Self parameterization to avoid "bad fcs" problem
Custom PIN association (bully and reaver)
Pixie Dust attacks (bully and reaver)</li How to install airgeddon on Ubuntu
There are two methods to install airgeddon on Ubuntu: using git or using wget and unzip. Both methods require you to have root privileges and some dependencies installed. You can check the list of dependencies on the . Here are the steps for each method:
Installation method 1: using git
Install git if you don't have it already: sudo apt install git
Clone the airgeddon repository: git clone --depth 1 [12](
Go to the newly created directory: cd airgeddon
Run the airgeddon script: sudo bash airgeddon.sh
Installation method 2: using wget and unzip
Install wget and unzip if you don't have them already: sudo apt install wget unzip
Download the airgeddon package: wget [11](
Unzip the downloaded file: unzip master.zip
Go to the newly created directory: cd airgeddon-master
Run the airgeddon script: sudo bash airgeddon.sh
Note that airgeddon should be launched with bash and not with sh or any other kind of shell. If you launch the script using another shell, there will be syntax errors and faulty results. Always launch using bash!
How to install airgeddon on ubuntu
Airgeddon ubuntu wireless network auditing tool
Airgeddon tutorial for ubuntu users
Download airgeddon latest version for ubuntu
Airgeddon github repository for ubuntu installation
Airgeddon kali linux vs ubuntu comparison
Airgeddon features and usage on ubuntu
Airgeddon dependencies and requirements for ubuntu
Airgeddon binary installation for ubuntu
Airgeddon sourceforge download link for ubuntu
Airgeddon interface mode switcher on ubuntu
Airgeddon dos attacks over wifi on ubuntu
Airgeddon evil twin attacks on ubuntu
Airgeddon wps attacks on ubuntu
Airgeddon handshake tools on ubuntu
Airgeddon decrypt and crack wifi passwords on ubuntu
Airgeddon captive portal attacks on ubuntu
Airgeddon brute force attacks on ubuntu
Airgeddon pin database integrated on ubuntu
Airgeddon beini compatibility mode on ubuntu
Airgeddon hashcat support on ubuntu
Airgeddon cowpatty support on ubuntu
Airgeddon pyrit support on ubuntu
Airgeddon online wpa cracker on ubuntu
Airgeddon wpa/wpa2 personal dictionary attacks on ubuntu
Airgeddon wpa/wpa2 enterprise attacks on ubuntu
Airgeddon wpa/wpa2 psk attacks on ubuntu
Airgeddon wpa/wpa2 ccmp attacks on ubuntu
Airgeddon wpa/wpa2 tkip attacks on ubuntu
Airgeddon wep attacks on ubuntu
Airgeddon wep open attacks on ubuntu
Airgeddon wep shared attacks on ubuntu
Airgeddon wep chopchop attacks on ubuntu
Airgeddon wep fragmentation attacks on ubuntu
Airgeddon wep hirte attacks on ubuntu
Airgeddon wep arp replay attacks on ubuntu
Airgeddon wep fakeauth attacks on ubuntu
Airgeddon wep caffe-latte attacks on ubuntu
Airgeddon wep p0841 attacks on ubuntu
Airgeddon wep hirte caffe-latte p0841 combo attacks on ubuntu
Download airgeddon arch linux for ubuntu users
Download airgeddon parrot os for ubuntu users
Download airgeddon blackarch for ubuntu users
Download airgeddon backbox for ubuntu users
Download airgeddon pentoo for ubuntu users
Download airgeddon wifislax for ubuntu users
How to use airgeddon on Ubuntu
Airgeddon is a menu-driven tool that allows you to perform various security tests on wireless networks. It has different modes and options that you can choose from depending on your needs. Here are some of the main features and how to use them:
How to launch airgeddon
To launch airgeddon, you need to run the script with root privileges: sudo bash airgeddon.sh. You will see a welcome screen with some information and a disclaimer. You need to accept the terms and conditions to continue. Then, you will see a screen where you can choose your language. Airgeddon supports 20 languages, including English, Spanish, French, German, Chinese, Russian, and Arabic. After choosing your language, you will see a screen where you can check your dependencies. Airgeddon will show you which tools are essential and which are optional for its functionality. You can try to install the missing dependencies automatically if you are running Kali, Parrot-Security, or BlackArch Linux. Otherwise, you need to install them manually using your package manager or other sources. After checking your dependencies, you will see a screen where you can select your wireless interface. Airgeddon will show you which interfaces are available and which ones support monitor mode and VIF (Virtual Interface). You need an interface that supports both features to perform some of the attacks, such as evil twin attacks. After selecting your interface, you will enter the main menu of airgeddon.
How to scan wireless networks
To scan wireless networks, you need to choose option 4 from the main menu: "Explore for targets". This will put your interface in monitor mode and start scanning for nearby networks. You will see a list of networks with their BSSID, channel, encryption, power, ESSID, and WPS status. You can press Ctrl+C to stop the scan and select a target network by entering its number. You can also filter the networks by channel or encryption type by choosing option 5 or 6 from the main menu. After selecting a target network, you will see its details and a new menu with different options depending on the encryption type of the network.
How to perform WEP cracking
To perform WEP cracking, you need to select a network that has WEP encryption from the scan results. Then, you will see a menu with options 7 to 13 that are specific for WEP attacks. You can choose option 7 to perform an all-in-one attack that combines different techniques to capture the WEP key. This option will launch airodump-ng to capture traffic from the target network, aireplay-ng to inject packets and generate ARP requests, and aircrack-ng to crack the WEP key using the captured [assistant](#continue) IVs. This option may take some time depending on the network traffic and the power of the network. You can also choose other options to perform specific attacks, such as fake authentication, ARP replay, chopchop, fragmentation, caffe-latte, hirte, or p0841. Once you have captured enough IVs, you can choose option 13 to crack the WEP key using aircrack-ng. You can also choose option 14 to clean and optimize the captured files before cracking. If the cracking is successful, you will see the WEP key on the screen.
How to perform WPA/WPA2/WPA3 cracking
To perform WPA/WPA2/WPA3 cracking, you need to select a network that has WPA, WPA2, or WPA3 encryption from the scan results. Then, you will see a menu with options 7 to 12 that are specific for WPA attacks. You can choose option 7 to perform a handshake or PMKID capture. This option will launch airodump-ng to capture traffic from the target network and aireplay-ng to deauthenticate a client and force a reconnection. If the capture is successful, you will see a