⚠️ FOR EDUCATIONAL AND AUTHORIZED TESTING ONLYThese tools are designed for learning wireless security concepts and conducting authorized penetration testing. Unauthorized access to wireless networks is illegal.
- Overview
⚠️ Legal Disclaimer- Features
- Prerequisites
- Installation
- Usage
- Educational Objectives
- Responsible Use Guidelines
- Contributing
- License
- Contact
A collection of educational bash scripts that automate functions of the aircrack-ng suite for authorized wireless network security assessments. These tools help security professionals and students understand wireless vulnerabilities and practice ethical hacking techniques.
🚨 CRITICAL: READ BEFORE USE
- ✅ Legal Use Only: Use only on networks you own or have explicit written authorization to test
- ❌ Illegal Use: Unauthorized wireless network access is a criminal offense in most jurisdictions
- 📚 Educational Purpose: Designed for learning and authorized security research
- 🔒 Responsible Disclosure: Report vulnerabilities through proper channels
- ⚖️ User Responsibility: You assume full legal responsibility for use of these tools
By using these tools, you agree to comply with all applicable laws and use them only for authorized, ethical purposes.
- 🎯 Automated BSSID discovery and channel detection
- 📡 WPA handshake capture via deauthentication
- 🔓 Dictionary-based PSK cracking
- 💾 Credential saving and handshake management
- 🛡️ Built-in error handling and cleanup
- 🏗️ Automated access point configuration
- 🌐 DHCP and DNS service setup
- 🔄 NAT and routing configuration
- 📊 Client connection monitoring
- 🧪 Evil twin attack simulation
- OS: Linux (Debian/Ubuntu preferred)
- Privileges: Root access required
- Hardware: Wireless adapter with monitor mode support
# Install required packages
sudo apt update
sudo apt install -y aircrack-ng hostapd dnsmasq iptables-persistent iw- Wireless adapters supporting monitor mode
- Multiple wireless interfaces (recommended for Script 2)
-
Clone the repository
git clone https://github.com/yourusername/wireless-security-tools.git cd wireless-security-tools -
Make scripts executable
chmod +x *.sh -
Verify dependencies
./check-dependencies.sh
# Run main attack script
sudo ./wireless-attack.sh
# Show saved handshakes
sudo ./wireless-attack.sh handshakes
# Use saved handshake
sudo ./wireless-attack.sh <handshake-filename>
# Access point setup
sudo ./ap-setup.sh# Show help
sudo ./wireless-attack.sh --help
# List available interfaces
iwconfig~/wifi_attack/
├── wordlists/ # Password dictionaries
├── captured_handshake/ # Temporary capture files
│ └── saved_handshake/ # Persistent handshake storage
└── saved_credentials/ # Cracked passwords
- 🎓 Learn Wireless Security: Understand WPA/WPA2 vulnerabilities
- 🔍 Penetration Testing: Practice authorized network assessment
- 🛡️ Defensive Security: Improve your own network security
- 📖 Security Research: Contribute to wireless security knowledge
- Your own networks
- Client networks with written permission
- Dedicated lab environments
- Educational institutions with proper oversight
- Public Wi-Fi networks
- Neighbor's networks
- Corporate networks without permission
- Any network you don't own or lack explicit authorization
- Get Written Permission: Always obtain explicit authorization
- Document Everything: Keep records of authorized testing
- Report Responsibly: Use proper disclosure channels
- Respect Privacy: Don't access or modify data
- Follow Laws: Understand local cybersecurity regulations
We welcome contributions that improve educational value and security:
- Fork the repository
- Create a feature branch (
git checkout -b feature/improvement) - Commit changes (
git commit -am 'Add educational feature') - Push to branch (
git push origin feature/improvement) - Create a Pull Request
- Maintain educational focus
- Include proper documentation
- Add safety checks and error handling
- Follow responsible disclosure principles
This project is licensed under the GNU Affero General Public License v3.0 - see the LICENSE file for details.
- ✅ Use for educational and authorized testing
- ✅ Modify and distribute with attribution
- ✅ Commercial use with AGPL compliance
- ❌ Remove copyright notices
- ❌ Use for unauthorized network access
⚖️ Remember: With great power comes great responsibility. Use these tools ethically and legally.