top of page

Group

Public·10 members

Learn Wireless Pentesting with Airgeddon on Ubuntu


Download Airgeddon on Ubuntu




Airgeddon is a multi-use bash script for Linux systems to audit wireless networks. It has many features, such as WEP, WPA, WPA2, and WPA3 cracking, evil twin attacks, WPS attacks, enterprise network attacks, and more. In this article, I will show you how to install and use airgeddon on Ubuntu step by step. Let's get started!




download airgeddon ubuntu



What is airgeddon?




Airgeddon is a tool that allows you to perform various security tests on wireless networks. It is written in bash and uses other tools such as aircrack-ng, bettercap, hashcat, hostapd, lighttpd, mdk4, nftables/iptables, and others. Airgeddon can help you to discover vulnerabilities in wireless networks and exploit them.


Features of airgeddon




According to its , airgeddon has the following features:


  • Interface mode switcher (Monitor-Managed) keeping selection even on interface name changing



  • DoS over wireless networks using different methods (mdk3, mdk4, aireplay-ng). "DoS Pursuit mode" available to avoid AP channel hopping (available also on DoS performed on Evil Twin attacks)



  • Full support for 2.4Ghz and 5Ghz bands



  • Assisted WPA/WPA2 personal networks Handshake file and PMKID capturing



  • Cleaning and optimizing Handshake captured files



  • Offline password decrypting on WPA/WPA2 captured files for personal networks (Handshakes and PMKIDs) using dictionary, bruteforce and rule based attacks with aircrack, crunch and hashcat tools.



  • Enterprise networks captured password decrypting based on john the ripper, crunch, asleap and hashcat tools. GPU support available for hashcat.



  • WPA3 online dictionary attack (plugin based)



  • Evil Twin attacks (Rogue AP) - WPA/WPA2/WPA3 Only Rogue/Fake AP mode to sniff using external sniffer (Hostapd + DHCP + DoS)



  • Simple integrated sniffing (Hostapd + DHCP + DoS + Ettercap)



  • Integrated sniffing, sslstrip2 (Hostapd + DHCP + DoS + Bettercap)



  • Integrated sniffing, sslstrip2 and BeEF Browser Exploitation Framework (Hostapd + DHCP + DoS + Bettercap + BeEF)



  • Captive portal with "DNS blackhole" to capture wifi passwords (Hostapd + DHCP + DoS + Dnsspoff + Lighttpd)



  • Optional MAC spoofing for all Evil Twin attacks



  • Optional advanced captive portal including vendor logos



WPS features


  • WPS scanning (wash).



  • Self parameterization to avoid "bad fcs" problem



  • Custom PIN association (bully and reaver)



Pixie Dust attacks (bully and reaver)</li How to install airgeddon on Ubuntu




There are two methods to install airgeddon on Ubuntu: using git or using wget and unzip. Both methods require you to have root privileges and some dependencies installed. You can check the list of dependencies on the . Here are the steps for each method:


Installation method 1: using git




  • Install git if you don't have it already: sudo apt install git



Clone the airgeddon repository: git clone --depth 1 [12](


  • Go to the newly created directory: cd airgeddon





Installation method 2: using wget and unzip




  • Install wget and unzip if you don't have them already: sudo apt install wget unzip



Download the airgeddon package: wget [11](


  • Unzip the downloaded file: unzip master.zip



  • Go to the newly created directory: cd airgeddon-master





Note that airgeddon should be launched with bash and not with sh or any other kind of shell. If you launch the script using another shell, there will be syntax errors and faulty results. Always launch using bash!


How to install airgeddon on ubuntu


Airgeddon ubuntu wireless network auditing tool


Airgeddon tutorial for ubuntu users


Download airgeddon latest version for ubuntu


Airgeddon github repository for ubuntu installation


Airgeddon kali linux vs ubuntu comparison


Airgeddon features and usage on ubuntu


Airgeddon dependencies and requirements for ubuntu


Airgeddon binary installation for ubuntu


Airgeddon sourceforge download link for ubuntu


Airgeddon interface mode switcher on ubuntu


Airgeddon dos attacks over wifi on ubuntu


Airgeddon evil twin attacks on ubuntu


Airgeddon wps attacks on ubuntu


Airgeddon handshake tools on ubuntu


Airgeddon decrypt and crack wifi passwords on ubuntu


Airgeddon captive portal attacks on ubuntu


Airgeddon brute force attacks on ubuntu


Airgeddon pin database integrated on ubuntu


Airgeddon beini compatibility mode on ubuntu


Airgeddon hashcat support on ubuntu


Airgeddon cowpatty support on ubuntu


Airgeddon pyrit support on ubuntu


Airgeddon online wpa cracker on ubuntu


Airgeddon wpa/wpa2 personal dictionary attacks on ubuntu


Airgeddon wpa/wpa2 enterprise attacks on ubuntu


Airgeddon wpa/wpa2 psk attacks on ubuntu


Airgeddon wpa/wpa2 ccmp attacks on ubuntu


Airgeddon wpa/wpa2 tkip attacks on ubuntu


Airgeddon wep attacks on ubuntu


Airgeddon wep open attacks on ubuntu


Airgeddon wep shared attacks on ubuntu


Airgeddon wep chopchop attacks on ubuntu


Airgeddon wep fragmentation attacks on ubuntu


Airgeddon wep hirte attacks on ubuntu


Airgeddon wep arp replay attacks on ubuntu


Airgeddon wep fakeauth attacks on ubuntu


Airgeddon wep caffe-latte attacks on ubuntu


Airgeddon wep p0841 attacks on ubuntu


Airgeddon wep hirte caffe-latte p0841 combo attacks on ubuntu


Download airgeddon arch linux for ubuntu users


Download airgeddon parrot os for ubuntu users


Download airgeddon blackarch for ubuntu users


Download airgeddon backbox for ubuntu users


Download airgeddon pentoo for ubuntu users


Download airgeddon wifislax for ubuntu users


How to use airgeddon on Ubuntu




Airgeddon is a menu-driven tool that allows you to perform various security tests on wireless networks. It has different modes and options that you can choose from depending on your needs. Here are some of the main features and how to use them:


How to launch airgeddon




To launch airgeddon, you need to run the script with root privileges: sudo bash airgeddon.sh. You will see a welcome screen with some information and a disclaimer. You need to accept the terms and conditions to continue. Then, you will see a screen where you can choose your language. Airgeddon supports 20 languages, including English, Spanish, French, German, Chinese, Russian, and Arabic. After choosing your language, you will see a screen where you can check your dependencies. Airgeddon will show you which tools are essential and which are optional for its functionality. You can try to install the missing dependencies automatically if you are running Kali, Parrot-Security, or BlackArch Linux. Otherwise, you need to install them manually using your package manager or other sources. After checking your dependencies, you will see a screen where you can select your wireless interface. Airgeddon will show you which interfaces are available and which ones support monitor mode and VIF (Virtual Interface). You need an interface that supports both features to perform some of the attacks, such as evil twin attacks. After selecting your interface, you will enter the main menu of airgeddon.


How to scan wireless networks




To scan wireless networks, you need to choose option 4 from the main menu: "Explore for targets". This will put your interface in monitor mode and start scanning for nearby networks. You will see a list of networks with their BSSID, channel, encryption, power, ESSID, and WPS status. You can press Ctrl+C to stop the scan and select a target network by entering its number. You can also filter the networks by channel or encryption type by choosing option 5 or 6 from the main menu. After selecting a target network, you will see its details and a new menu with different options depending on the encryption type of the network.


How to perform WEP cracking




To perform WEP cracking, you need to select a network that has WEP encryption from the scan results. Then, you will see a menu with options 7 to 13 that are specific for WEP attacks. You can choose option 7 to perform an all-in-one attack that combines different techniques to capture the WEP key. This option will launch airodump-ng to capture traffic from the target network, aireplay-ng to inject packets and generate ARP requests, and aircrack-ng to crack the WEP key using the captured [assistant](#continue) IVs. This option may take some time depending on the network traffic and the power of the network. You can also choose other options to perform specific attacks, such as fake authentication, ARP replay, chopchop, fragmentation, caffe-latte, hirte, or p0841. Once you have captured enough IVs, you can choose option 13 to crack the WEP key using aircrack-ng. You can also choose option 14 to clean and optimize the captured files before cracking. If the cracking is successful, you will see the WEP key on the screen.


How to perform WPA/WPA2/WPA3 cracking




To perform WPA/WPA2/WPA3 cracking, you need to select a network that has WPA, WPA2, or WPA3 encryption from the scan results. Then, you will see a menu with options 7 to 12 that are specific for WPA attacks. You can choose option 7 to perform a handshake or PMKID capture. This option will launch airodump-ng to capture traffic from the target network and aireplay-ng to deauthenticate a client and force a reconnection. If the capture is successful, you will see a


  • About

    Welcome to the group! You can connect with other members, ge...

    Group Page: Groups_SingleGroup
    bottom of page