Implemented a way to not send deauthentication and/or association packets to AP's for which key material was already acquired

This commit is contained in:
Frank Spierings 2020-02-28 12:05:23 +01:00
commit a0a0963cd5
3 changed files with 34 additions and 0 deletions

View file

@ -49,9 +49,11 @@ type WiFiModule struct {
deauthSkip []net.HardwareAddr
deauthSilent bool
deauthOpen bool
deauthAcquired bool
assocSkip []net.HardwareAddr
assocSilent bool
assocOpen bool
assocAcquired bool
filterProbeSTA *regexp.Regexp
filterProbeAP *regexp.Regexp
apRunning bool
@ -80,9 +82,11 @@ func NewWiFiModule(s *session.Session) *WiFiModule {
deauthSkip: []net.HardwareAddr{},
deauthSilent: false,
deauthOpen: false,
deauthAcquired: false,
assocSkip: []net.HardwareAddr{},
assocSilent: false,
assocOpen: false,
assocAcquired: false,
showManuf: false,
shakesAggregate: true,
writes: &sync.WaitGroup{},
@ -209,6 +213,10 @@ func NewWiFiModule(s *session.Session) *WiFiModule {
"true",
"Send wifi deauth packets to open networks."))
mod.AddParam(session.NewBoolParameter("wifi.deauth.acquired",
"false",
"Send wifi deauth packets from AP's for which key material was already acquired."))
assoc := session.NewModuleHandler("wifi.assoc BSSID", `wifi\.assoc ((?:[a-fA-F0-9:]{11,})|all|\*)`,
"Send an association request to the selected BSSID in order to receive a RSN PMKID key. Use 'all', '*' or a broadcast BSSID (ff:ff:ff:ff:ff:ff) to iterate for every access point.",
func(args []string) error {
@ -272,6 +280,10 @@ func NewWiFiModule(s *session.Session) *WiFiModule {
"false",
"Send association requests to open networks."))
mod.AddParam(session.NewBoolParameter("wifi.assoc.acquired",
"false",
"Send association to AP's for which key material was already acquired."))
mod.AddHandler(session.NewModuleHandler("wifi.ap", "",
"Inject fake management beacons in order to create a rogue access point.",
func(args []string) error {