Info

Pentesting Wifi

MacOS

<https://programmer.group/mac-os-cracking-wifi-wpa-wpa2.html>

git clone <https://github.com/Tommrodrigues/WiFiCrack.git>

sudo ln -s /System/Library/PrivateFrameworks/Apple80211.framework/Versions/Current/Resources/airport /usr/local/bin/airport

git clone <https://github.com/hashcat/hashcat-utils.git>; cd hashcat-utils/src; gcc -o cap2hcca; px cap2hccapx.c; mv ./cap2hccapx /usr/local/bin/

brew install aircrack-ng
brew install hashcat
brew install hcxtools
brew install --cask wireshark

<https://github.com/0x0XDev/JamWiFi>

#Check
airport -h
aircrack-ng --help
cap2hccapx -h
hashcat -h
hcxhash2cap -h
tcpdump -h
wireshark -h
ifconfig
airport -s
airport en0 sniff 7
aircrack-ng /tmp/airportSniffLbhZSp.cap
aircrack-ng -w dict.txt -b c0:61:18:11:d9:dc /tmp/airportSniffLbhZSp.cap

EapHammer

sudo ./eaphammer --interface en0 \\
        --auth wpa-eap \\
        --essid WiFIName \\
        --creds

Passwords lookup

Windows

Linux

MacOS


Above (Traffic Sniffer)

GitHub - cursedpkt/Above: Invisible network protocol sniffer

Install

# Install python3 first
brew install python3
# Then install required dependencies
sudo pip3 install scapy colorama setuptools

# Clone the repo
git clone <https://github.com/cursedpkt/Above>
cd Above/
sudo python3 setup.py install

Using

sudo /System/Library/PrivateFrameworks/Apple80211.framework/Versions/Current/Resources/airport en0 sniff

sudo above --interface en0 --timer 120 --output-pcap ./dump.pcap