Airgeddon$ Pentest Course
# Airgeddon$ Pentest Course – Section 5: Mastering Airgeddon$## Installation and Configuration on Kali LinuxAirgeddon is a multi-use bash script for Linux systems that can be used for various network attacks, including man-in-the-middle attacks, capturing handshakes, and de-authentication protocols. Kali Linux comes pre-installed with a variety of penetration testing tools, including Airgeddon. However, there may be instances when you need to install or update it manually.### Installing Airgeddon1. **Open Terminal**: Begin by opening your terminal in Kali Linux.2. **Update System**: Ensure that your system is up-to-date by running the following command:
sudo apt update && sudo apt upgrade -y
3. **Install Dependencies**: Airgeddon requires several dependencies to function correctly. Install them using the following command:
sudo apt install git aircrack-ng dnsmasq-utils hostapd lighttpd
4. **Clone the Airgeddon Repository**: Use `git` to clone the Airgeddon repository from GitHub.
git clone https://github.com/v1s1t0r1sh3r3/airgeddon.git
5. **Navigate to the Airgeddon Directory**:
6. **Run Airgeddon**: You can start Airgeddon by executing the following command:
7. **Configure Interface**: Once Airgeddon is running, configure your wireless card in monitor mode:
sudo airmon-ng start wlan0
Replace `wlan0` with your actual wireless network interface.### Configuring AirgeddonUpon launching Airgeddon, you will encounter a user-friendly interface. Here’s how to configure it:– **Select Wireless Interface**: Choose your wireless interface from the list provided.
– **Enable Monitor Mode**: Ensure that monitor mode is active by checking the status of your interface.
– **Check Dependencies**: Airgeddon will automatically verify if all dependencies are installed. If something is missing, it will prompt you to install it.## Step-by-Step Usage and Real-World Use Cases### Use Case 1: Capturing WPA/WPA2 HandshakesOne of the most common tasks of Airgeddon is capturing WPA/WPA2 handshakes, which can be used to crack Wi-Fi passwords.1. **Start Airgeddon**: Run the script as mentioned above.
2. **Select the “WPA/WPA2 Handshake” option**.3. **Choose Monitor Mode Interface**: Select the interface you put into monitor mode (e.g., `wlan0mon`).4. **Scan for Networks**: Allow Airgeddon to scan for available networks. It will display a list.5. **Select Target Network**: Choose the target network you want to attack.6. **De-authenticate Clients**: Airgeddon can send de-authentication packets to connected clients which will force them to reconnect, thus capturing the handshake.
aireplay-ng –deauth 10 -a -c wlan0mon
Replace `
` and `` with the respective values.7. **Capture Handshake**: Once a client reconnects, Airgeddon will automatically capture the handshake.8. **Save the Capture File**: After capturing, save the `.cap` file for later cracking.### Use Case 2: Conducting Evil Twin AttacksThe Evil Twin attack mimics a legitimate access point to deceive users into connecting to it.1. **Select the “Evil Twin” option** in Airgeddon.2. **Choose Your Wireless Interface**: Again, use the interface in monitor mode.3. **Scan for Target Networks**: Airgeddon will list all nearby networks.4. **Select Target Network**: Choose the network you want to impersonate.5. **Create Fake AP**: Set up the fake access point using hostapd.6. **Configure DHCP**: Use dnsmasq for IP allocation to clients connecting to your fake access point.7. **Monitor Connections**: Once users start connecting, you can capture data or even handshakes as they log in.### Use Case 3: Man-in-the-Middle (MitM) AttacksAirgeddon facilitates MitM attacks to intercept and manipulate traffic between clients and the network.1. **Select the appropriate MitM option** in Airgeddon.2. **Choose the Target Network**: Identify which network to target.3. **Set Up Fake AP**: Similar to the Evil Twin setup, create a fake access point for the MitM attack.4. **Configure ARP Spoofing**: Use tools like `ettercap` integrated into Airgeddon to spoof ARP requests and responses.5. **Capture Traffic**: Monitor the traffic for sensitive credentials and data.## Detailed Technical Explanations### Wi-Fi Authentication ProtocolsUnderstanding the underlying protocols is crucial for effective penetration testing. The most common protocols used in wireless networks are WPA/WPA2.– **WPA (Wi-Fi Protected Access)**: This protocol includes TKIP (Temporal Key Integrity Protocol) for encryption. WPA is considered less secure compared to WPA2.– **WPA2**: Utilizes AES (Advanced Encryption Standard) for encryption, which is significantly more robust than TKIP. WPA2 is the standard for most modern Wi-Fi networks.### Capturing HandshakesWhen clients connect to a WPA/WPA2 secured network, they perform a four-way handshake that is crucial for authentication. Capturing this handshake allows an attacker to attempt to crack the password offline.### Evil Twin Attack MechanicsIn an Evil Twin attack, the attacker creates a rogue access point with the same SSID as a legitimate network, causing clients to connect unknowingly. This attack exploits the trust users have in known network names.### Man-in-the-Middle AttacksMitM attacks involve intercepting communication between two parties without their knowledge. This can allow attackers to capture sensitive data, inject malicious content, or manipulate traffic.### ReferencesFor further reading and resources on penetration testing and Airgeddon, check out the following links:– [Airgeddon GitHub Repository](https://github.com/v1s1t0r1sh3r3/airgeddon)
– [Kali Linux Documentation](https://www.kali.org/docs/)
– [Aircrack-ng Documentation](https://www.aircrack-ng.org/)
– [Understanding WPA/WPA2 Handshake](https://www.cipher.org.au/how-to-capture-handshake)[/dm_code_snippet]markdown
# Code Blocks for WordPress## Capturing WPA/WPA2 Handshake
sudo airmon-ng start wlan0
sudo bash airgeddon.sh
# Select WPA/WPA2 Handshake
# Choose the target network and de-authenticate
aireplay-ng –deauth 10 -a -c wlan0mon
## Evil Twin Setup
# Start Airgeddon
sudo bash airgeddon.sh
# Select Evil Twin
# Choose target network and create fake AP
[/dm_code_snippet]## ConclusionIn this course segment, we’ve explored the installation, configuration, and practical usage of Airgeddon for various penetration testing scenarios. By mastering Airgeddon, you will enhance your toolkit for conducting ethical hacking and pen-testing assessments.Remember to always practice ethical hacking and only conduct penetration tests on networks you own or have explicit permission to test.—Made by pablo rotem / פבלו רותם