Commit graph

208 commits

Author SHA1 Message Date
evilsocket
2ce3a65eaf
new: added new Technicolor OUI for secondary router interfaces 2019-02-12 10:49:37 +01:00
evilsocket
a6e87618d4
misc: small fix or general refactoring i did not bother commenting 2019-02-12 10:18:34 +01:00
evilsocket
17952a3904
Merge pull request #439 from rhaidiz/master
Add option to manually specify the gateway
2019-02-12 10:07:30 +01:00
evilsocket
c55aed1ca2
fix: fixed a bug which caused AP RSSI being 0 when fake association frames were sent 2019-02-11 14:29:30 +01:00
rhaidiz
e1023d4b66 Add option to manually specify the gateway. 2019-02-10 14:46:05 +01:00
evilsocket
acbc6d28dd
new: new wifi.assoc command to perform a RSN PMKID clientless attack (closes #436) 2019-02-07 18:27:14 +01:00
evilsocket
0ec645afd3
new: started implementing RSN PMKID parsing support (ref #436) 2019-02-07 15:15:15 +01:00
evilsocket
e9b93b8586
fix: save unsaved packets only if handshake is complete 2019-02-06 14:07:58 +01:00
evilsocket
621f03c946
new: reporting alias and vendor for wifi.client.new and wifi.client.lost events 2019-02-06 12:46:03 +01:00
evilsocket
4c5a776f86
new: wifi.recon now reports wifi.client.new and wifi.client.lost events 2019-02-06 11:38:28 +01:00
evilsocket
003139a2e3
new: wifi.recon will activate the interface if it's down instead of failing 2019-02-06 09:42:48 +01:00
evilsocket
ae223d7110
misc: small fix or general refactoring i did not bother commenting 2019-02-06 08:46:19 +01:00
evilsocket
1d55083f75
new: new wifi.deauth.open boolean parameter to optionally skip open networks while deauthing en masse 2019-02-06 07:53:39 +01:00
evilsocket
1120f98be1
fix: one beacon packet per handshake is saved in order to have both the ESSID and BSSID 2019-02-06 07:08:01 +01:00
evilsocket
a90f63b643
new: added number of captured full handshakes in wifi.show 2019-02-05 19:56:21 +01:00
evilsocket
a6cfb2413f
new: added native wifi handshakes capture from wifi.recon module 2019-02-05 19:42:13 +01:00
yungtravla
a483c22e8d
fix regexp when ip route does not end with interface name 2019-02-05 15:14:40 +10:00
yungtravla
fd3efcac09
fix regexp to match default gateway IPv4 address and interface name 2019-02-05 15:12:17 +10:00
yungtravla
a9ceae3b4f
fix regexp to match gateway IPv4 address 2019-02-05 14:58:11 +10:00
yungtravla
ef1f2a19f8
fix regexp to match hostnames with hyphens 2019-02-05 14:01:17 +10:00
yungtravla
61c99c4b0f
fix matching of hostnames with hyphens 2019-02-05 13:59:44 +10:00
evilsocket
2c2be3149d
fix: don't overwrite full WPS map when new info arrive 2019-01-27 15:06:43 +01:00
evilsocket
50bf22af9c
new: new WPS parsing capabilities and wifi.show.wps command 2019-01-27 14:52:59 +01:00
evilsocket
79279126e6
fix: fixed compilation of macOS for wifi modules 2019-01-20 18:30:22 +01:00
evilsocket
bf34561a19
new: added interface name and channel on wifi.show 2019-01-19 18:03:31 +01:00
evilsocket
ca734335fa
new: implemented wifi.deauth.skip variable (closes #375) 2019-01-18 16:19:30 +01:00
Sophie Brun
47c37c066c
Fix the IPv4RouteParser regular expression
The IPv4RouteParser regular expression fails to match when there is nothing after the interface name like in the following case:
    $ ip route
    default via 10.1.52.1 dev eth0 
    10.1.52.0/23 dev eth0 proto kernel scope link src 10.1.52.148
2018-11-23 11:03:13 +01:00
evilsocket
85c2d0b4fa
fix: gracefully handling corrupted or not compatible alias databases (fixes #391) 2018-11-22 13:06:29 +01:00
evilsocket
df99940ac5
misc: small fix or general refactoring i did not bother commenting 2018-11-02 15:01:11 +01:00
evilsocket
260f2863c4
new: wifi modules now supports 5G wifi networks on macOS (closes #361) 2018-10-30 15:24:47 +01:00
Edznux
2fe8999b2d revert ! 2018-10-28 17:42:25 +01:00
Edznux
d80fef3ef9 Re-run gofmt -s after modifications 2018-10-23 06:35:22 +02:00
Edznux
191e8eacff Refactor if/else and switch for the modules package 2018-10-23 06:09:10 +02:00
Edznux
ed6d40f163 refactor if/else in network and packets packages 2018-10-23 05:32:51 +02:00
Edznux
e333df35d4 Add gofmt -s to the build 2018-10-23 03:27:38 +02:00
evilsocket
7f808ac059
refact: migrated aliases to islazy/data.UnsortedKV 2018-10-13 18:39:31 +02:00
evilsocket
788c8d5994 fix: trimming route line (fixes #357) 2018-10-13 02:18:14 +02:00
evilsocket
236a9940d9 misc: added more debug logs (ref #357) 2018-10-12 19:09:53 +02:00
evilsocket
e50eaad7e6 new: added debug callback to the network package 2018-10-12 13:24:13 +02:00
evilsocket
d070445225 refact: refactored to use islazy and updated deps 2018-10-10 19:00:25 +02:00
evilsocket
a2b3ee79fb new: net.show now accepts a comma separated list of ip, macs or aliases to filter for 2018-10-06 14:57:40 +02:00
evilsocket
431215b053 new: parsing device name from intercepted mdns:md values 2018-09-22 14:13:43 +02:00
evilsocket
976465959e
new: using wireshark manufacturers file instead of oui.dat (closes #303) 2018-09-09 18:48:41 +03:00
eenblam
a859c80b64 lint: use raw string for regex.MustCompile 2018-08-31 15:18:01 -07:00
eenblam
7cca7b9d93 Add tests for ParseTargets
Still need tests with actual alias map
2018-08-31 15:01:46 -07:00
eenblam
8778a2e9d6 Add iwlist <iface> freq test case 2018-08-31 14:09:54 -07:00
eenblam
56d1655727 Add initial test for net_linux.go
More tests needed based on iwlist output, but the side-effect-free
part of GetSupportedFrequencies() has been been broken out into a function
that can now be tested without calling core.Exec().
2018-08-31 14:09:54 -07:00
evilsocket
f79f4bff4c
minor refactoring of the ble module 2018-08-20 15:47:35 +02:00
evilsocket
49beed239f
misc: wifi.deauth has been optimized by sorting frames to send by channel in order to minimize the amount of channel hops 2018-08-17 14:57:44 +02:00
evilsocket
9e393e5bf4
fix: network.SetInterfaceChannel won't exec iwconfig if the interface is already on the requested channel. 2018-08-02 17:57:14 +02:00