Coder Social home page Coder Social logo

ragnt / angryoxide Goto Github PK

View Code? Open in Web Editor NEW
746.0 17.0 37.0 11.64 MB

802.11 Attack Tool

License: GNU General Public License v3.0

Rust 99.35% Shell 0.40% Makefile 0.25%
802-11 penetration-testing pentesting security-tools wireless-security aircrack aircrack-ng netsec netsec-tools

angryoxide's Introduction

AngryOxide ๐Ÿ˜ก

Logo

A 802.11 Attack tool built in Rust ๐Ÿฆ€ !

Builds and Release GitHub commit activity Discord

This tool is for research purposes only. I am not responsible for anything you do or damage you cause while using AngryOxide. Only use against networks that you have permission.

AngryOxide was developed as a way to learn Rust, netlink, kernel sockets, and WiFi exploitation all at once.

You can get information about how to use AngryOxide in the User Guide.

NOTE: This project is under HEAVY development and you can expect a very fast release cycle.

The overall goal of this tool is to provide a single-interface survey capability with advanced automated attacks that result in valid hashlines you can crack with Hashcat.

This tool is heavily inspired by hcxdumptool and development wouldn't have been possible without help from ZerBea.

If you have questions or any issues, you can reach me on the AngryOxide Discord

I wanna use it!

You can download pre-compiled binaries of AngryOxide in the releases.

tar -xf angryoxide-linux-x86_64.tar.gz # Untar
chmod +x install # Make executable
sudo install install # Install (as root, including zsh/bash completions)

You can get information about how to use AngryOxide in the User Guide.

Features

  • Active state-based attack engine used to retrieve relevent EAPOL messages from Access Points and clients.
  • Target option that accepts MAC (aabbcc..., aa:bb:cc...) and SSID "Test_SSID" to limit attack scope.
  • Whitelist option to protect specific networks from attacks. Useful if not using targets.
  • Auto Hunt capability to find all target channels and hop between them.
  • A Terminal-UI that presents all relevent data while still living in the terminal for easy usage over SSH.
  • Limits DEAUTHENTICATION frames that can cause more damage than good to the authentication sequence.
  • EAPOL 4-Way-Handshake validation using Nonce Correction, Replay Counter validation, and Temporal validation.
  • Automatically elicits PMKID from access points where available.
  • Utilizes GPSD with ability to set remote GPSD service address.
  • Provides pcapng files with embedded GPS using the Kismet Format.
  • Provides a kismetdb file with all frames (with GPS) for post-processing.
  • Wraps all output files in a gzipped tarball.
  • Bash autocompletions for easy interface selection provided.

Attacks

Will by default attack ALL access points in range, unless atleast one target is supplied, at which point the tool will only transmit against defined targets. (But will still passively collect on other access points).

  • Attempts authentication/association sequence to produce EAPOL Message 1 (PMKID Collection)
  • Attempts to retrieve hidden SSID's with undirected probe requests.
  • Utilizes Anonymous Reassociation to force Access Points to deauthenticate their own clients (MFP Bypass)
  • Will attempt to send Channel Switch Announcement to send clients to adjacent channels.
  • Attempts to downgrade RSN modes to WPA2-CCMP (Probe Response Injection)
  • Attempts to collect EAPOL M2 from stations based solely on Probe Requests (Rogue AP)
  • Will send controlled deauthentication frames unless told not to (--nodeauth)

All of these attacks are rate-controlled both to prevent erroneous EAPOL timer resets and to maintain some level of OPSEC.

Help

โฏ angryoxide --help
Does awesome things... with wifi.

Usage: angryoxide [OPTIONS] --interface <INTERFACE>

Options:
  -i, --interface <INTERFACE>     Interface to use
  -c, --channel <CHANNEL>         Optional - Channel to scan. Will use "-c 1,6,11" if none specified
  -b, --band <2 | 5 | 6 | 60>     Optional - Entire band to scan - will include all channels interface can support
  -o, --output <Output Filename>  Optional - Output filename
  -h, --help                      Print help
  -V, --version                   Print version

Targeting:
  -t <MAC Address or SSID>          Optional - Target (MAC or SSID) to attack - will attack everything if none specified
  -w <MAC Address or SSID>          Optional - Whitelist (MAC or SSID) to NOT attack
      --targetlist <Targets File>   Optional - File to load target entries from
      --whitelist <Whitelist File>  Optional - File to load whitelist entries from

Advanced Options:
  -r, --rate <1 | 2 | 3>              Optional - Attack rate (1, 2, 3 || 3 is most aggressive) [default: 2]
      --combine                       Optional - Combine all hc22000 files into one large file for bulk processing
      --noactive                      Optional - Disable Active Monitor mode
      --rogue <MAC Address>           Optional - Tx MAC for rogue-based attacks - will randomize if excluded
      --gpsd <IP:PORT>                Optional - Alter default HOST:Port for GPSD connection [default: 127.0.0.1:2947]
      --autohunt                      Optional - AO will auto-hunt all channels then lock in on the ones targets are on
      --headless                      Optional - Set the tool to headless mode without a UI. (useful with --autoexit)
      --autoexit                      Optional - AO will auto-exit when all targets have a valid hashline
      --notransmit                    Optional - Do not transmit - passive only
      --nodeauth                      Optional - Do NOT send deauths (will try other attacks only)
      --notar                         Optional - Do not tar output files
      --dwell <Dwell Time (seconds)>  Optional - Adjust channel hop dwell time [default: 2]

Building from source

If you want to build from source instead of using precompiled binaries, these are the basic instructions:

# Install Rust
curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh

# Clone this repo
git clone https://github.com/Ragnt/AngryOxide.git

# Build/Install
cd AngryOxide
make
sudo make install

This will build from source, install into /usr/bin/angryoxide, and install the bash completions for you.

Cross compiling:

I use cross to cross compile to embedded architectures.

Here is MIPS (mips-unknown-linux-musl) as an example.

# make sure you have the nightly installed
rustup install nightly

# dynamically linked & soft-float
cross build +nightly --target mips-unknown-linux-musl --release -Zbuild-std

Completions script:

These make using AngryOxide with bash and zsh a bit more fluid, automatically finding your wireless interfaces for you and showing you the arguments in a tab-completable way.

Screenshots!

Access Points Page Handshakes Page

angryoxide's People

Contributors

gobiassomecoffeeco avatar ragnt avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

angryoxide's Issues

Crash with Kali Linux (fully updated - last version of AngryOxide)

Describe the bug
It crashes right after the start:

image

thread 'main' panicked at src/main.rs:1095:48:
called Option::unwrap() on a None value
note: run with RUST_BACKTRACE=1 environment variable to display a backtrace

** Hardware (please complete the following information):**

  • Device: VMware Workstation Pro
  • OS: Kali
  • Interface: Alfa AWUS01900 USB

The wlan drivers work as far as I can tell in other tools.
Regards and thanks for you effort

0.8.5 no frames on Kali linux

Hello,

The previous version work well for me but the latest not get frames and find no network. STay blocked in frequency 5180 (36) just Ers continue to advance.
No error message.

I try 2 network adapter on intel and a Alfa.

The programme work a can (q) for quit.

I am in france if frequency region can influence.

Best regards

hc22000 file only written on exit

Hi,

Going over your code seems to confirm that the Hashcat .hc22000 file is only written once you quit the application and quit it cleanly.
For us that perhaps are going for multiple targets (ie. all) it would be much better that that the hc22000 file is written continuous doing the application running.

I've now had multiple times where it ran for let's say 2-3 days, unable to quit it cleanly as the "q" function did not work/respond and therefore i never get the hc22000 file.

It would be nice that it took the --output naming and then created a file just like the kismetdb and pcapng files but where it dumped (appended) the hc22000 strings everytime it was done collecting a full 4 way handshake for any device.

Hope that makes sense

Error: network down

After running successfully for a few minutes it shuts down saying "Error: network down". Using an Alfa AWUS036H running the precompiled binary angryoxide-linux-x86_64.tar.gz on kali linux

Also it would be nice to have a whitelist for networks you don't want to attack.

Angry Emoji

I noticed there isn't any angry emoji's in the project. I hope you'll remedy this in an upcoming release.

thread 'main' panicked at src/main.rs:3002:37:

Shortly, after launching application, program crashes.

To Reproduce
This only started occurring after running tool with additional channels to hop, that being 1,3,4,6,7,11,40,48
Prior to issue, I had ran the tool on default settings for quite a while with success.

Output
`sudo angryoxide --whitelist whitelist.txt -c 1,3,4,6,7,11,40,48 -i wlan0
Starting AngryOxide... ๐Ÿ˜ˆ
๐Ÿ’ฒ Interface Summary:
โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”“
โ”ƒ Interface: wlan0 โ”ƒ
โ”ƒ Index: 6 | Driver: mt76x2u โ”ƒ
โ”ƒ Mode: IftypeMonitor | Active Monitor: true โ”ƒ
โ”ƒ Modes: Adhoc, Station, Ap, ApVlan, Monitor, MeshPoint, P2P Client, P2P Go โ”ƒ
โ”ƒ State: Dormant โ”ƒ
โ”ƒ Current Frequency: 5200 (40) โ”ƒ
โ”ƒ Enabled Bands/Channels: โ”ƒ
โ”ƒ โ”ƒ
โ”ƒ Band2GHz: โ”ƒ
โ”ƒ [2412 (1)] [2417 (2)] [2422 (3)] [2427 (4)] โ”ƒ
โ”ƒ [2432 (5)] [2437 (6)] [2442 (7)] [2447 (8)] โ”ƒ
โ”ƒ [2452 (9)] [2457 (10)] [2462 (11)] [2467 (12)] โ”ƒ
โ”ƒ [2472 (13)] [2484 (14)] โ”ƒ
โ”ƒ โ”ƒ
โ”ƒ Band5GHz: โ”ƒ
โ”ƒ [5180 (36)] [5200 (40)] [5220 (44)] [5240 (48)] โ”ƒ
โ”ƒ [5260 (52)] [5280 (56)] [5300 (60)] [5320 (64)] โ”ƒ
โ”ƒ [5500 (100)] [5520 (104)] [5540 (108)] [5560 (112)] โ”ƒ
โ”ƒ [5580 (116)] [5600 (120)] [5620 (124)] [5640 (128)] โ”ƒ
โ”ƒ [5660 (132)] [5680 (136)] [5700 (140)] [5720 (144)] โ”ƒ
โ”ƒ [5745 (149)] [5765 (153)] [5785 (157)] [5805 (161)] โ”ƒ
โ”ƒ [5825 (165)] โ”ƒ
โ”ƒ โ”ƒ
โ”ƒ โ”ƒ
โ”—โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”›
๐Ÿ’ฒ No target list provided... everything is a target ๐Ÿ˜

========= White List =========
โ”œ SSID: CenturyLink1665
โ”” SSID: CenturyLink1665_5G
========== Total: 2 ==========

======== Hop Channels ========
โ”œ Band 5 Channels:
โ”‚ โ”œ 40
โ”‚ โ”” 48
โ”” Band 2 Channels:
โ”œ 1
โ”œ 3
โ”œ 4
โ”œ 6
โ”œ 7
โ”” 11

๐Ÿ’ฒ Dwell Time: 2
๐Ÿ’ฒ Attack Rate: Normal (2)
๐Ÿ’ฒ Setting wlan0 down.
๐Ÿ’ฒ Randomizing wlan0 mac to 82516ed507c5
๐Ÿ’ฒ Setting wlan0 to Monitor mode. ("active" flag: true)
๐Ÿ’ฒ Setting wlan0 up.
๐Ÿ’ฒ OUI Records Imported: 50153
๐Ÿ’ฒ Sockets Opened [Rx: 5 | Tx: 6]

๐ŸŽฉ KICKING UP THE 4D3D3D3 ๐ŸŽฉ

======================================================================

thread 'main' panicked at src/main.rs:3002:37:
Could not open hashfile for writing. (zEQQ3XJPK+30/+aP.hc22000).
note: run with RUST_BACKTRACE=1 environment variable to display a backtrace
`

Backtrace output
stack backtrace: 0: 0x7d4a14 - std::backtrace_rs::backtrace::libunwind::trace::h077be8d17a343ba0 at /rustc/07dca489ac2d933c78d3c5158e3f43beefeb02ce/library/std/src/../../backtrace/src/backtrace/libunwind.rs:104:5 1: 0x7d4a14 - std::backtrace_rs::backtrace::trace_unsynchronized::he9bae998f19d1192 at /rustc/07dca489ac2d933c78d3c5158e3f43beefeb02ce/library/std/src/../../backtrace/src/backtrace/mod.rs:66:5 2: 0x7d4a14 - std::sys_common::backtrace::_print_fmt::h3cb0a25ea4e06fd3 at /rustc/07dca489ac2d933c78d3c5158e3f43beefeb02ce/library/std/src/sys_common/backtrace.rs:68:5 3: 0x7d4a14 - <std::sys_common::backtrace::_print::DisplayBacktrace as core::fmt::Display>::fmt::h4d40c874ac3055f9 at /rustc/07dca489ac2d933c78d3c5158e3f43beefeb02ce/library/std/src/sys_common/backtrace.rs:44:22 4: 0x817fcc - core::fmt::rt::Argument::fmt::h2aa676397f4d236d at /rustc/07dca489ac2d933c78d3c5158e3f43beefeb02ce/library/core/src/fmt/rt.rs:142:9 5: 0x817fcc - core::fmt::write::hbc8bab57647a8d59 at /rustc/07dca489ac2d933c78d3c5158e3f43beefeb02ce/library/core/src/fmt/mod.rs:1120:17 6: 0x7d17f0 - std::io::Write::write_fmt::h6830a27da260044c at /rustc/07dca489ac2d933c78d3c5158e3f43beefeb02ce/library/std/src/io/mod.rs:1810:15 7: 0x7d4840 - std::sys_common::backtrace::_print::h45e3ba4a460b54dc at /rustc/07dca489ac2d933c78d3c5158e3f43beefeb02ce/library/std/src/sys_common/backtrace.rs:47:5 8: 0x7d4840 - std::sys_common::backtrace::print::ha90ccebd320c1f16 at /rustc/07dca489ac2d933c78d3c5158e3f43beefeb02ce/library/std/src/sys_common/backtrace.rs:34:9 9: 0x7d61dc - std::panicking::default_hook::{{closure}}::hea5e0840e75cbd54 10: 0x7d5efc - std::panicking::default_hook::h2da0c6e28ccefbb5 at /rustc/07dca489ac2d933c78d3c5158e3f43beefeb02ce/library/std/src/panicking.rs:292:9 11: 0x7d67b8 - <alloc::boxed::Box<F,A> as core::ops::function::Fn<Args>>::call::hadc01b877337b2a0 at /rustc/07dca489ac2d933c78d3c5158e3f43beefeb02ce/library/alloc/src/boxed.rs:2029:9 12: 0x7d67b8 - std::panicking::rust_panic_with_hook::he82b80ac427cd507 at /rustc/07dca489ac2d933c78d3c5158e3f43beefeb02ce/library/std/src/panicking.rs:783:13 13: 0x7d6530 - std::panicking::begin_panic_handler::{{closure}}::h9c22c275c948bda0 at /rustc/07dca489ac2d933c78d3c5158e3f43beefeb02ce/library/std/src/panicking.rs:657:13 14: 0x7d4ee4 - std::sys_common::backtrace::__rust_end_short_backtrace::hc10ef17bb01a2301 at /rustc/07dca489ac2d933c78d3c5158e3f43beefeb02ce/library/std/src/sys_common/backtrace.rs:171:18 15: 0x7d62d0 - rust_begin_unwind at /rustc/07dca489ac2d933c78d3c5158e3f43beefeb02ce/library/std/src/panicking.rs:645:5 16: 0x4156c8 - core::panicking::panic_fmt::hefc208866c42565e at /rustc/07dca489ac2d933c78d3c5158e3f43beefeb02ce/library/core/src/panicking.rs:72:14 17: 0x433174 - angryoxide::main::h19a9fbe428bacc64 18: 0x4b5610 - std::sys_common::backtrace::__rust_begin_short_backtrace::hc656463a074f5aff 19: 0x4b5930 - std::rt::lang_start::{{closure}}::h675a739bd481ad16 20: 0x7cb03c - core::ops::function::impls::<impl core::ops::function::FnOnce<A> for &F>::call_once::h0d9bdbcc7f85e49e at /rustc/07dca489ac2d933c78d3c5158e3f43beefeb02ce/library/core/src/ops/function.rs:284:13 21: 0x7cb03c - std::panicking::try::do_call::h80136b13eeaadde3 at /rustc/07dca489ac2d933c78d3c5158e3f43beefeb02ce/library/std/src/panicking.rs:552:40 22: 0x7cb03c - std::panicking::try::h2ec3fb47f55f59f5 at /rustc/07dca489ac2d933c78d3c5158e3f43beefeb02ce/library/std/src/panicking.rs:516:19 23: 0x7cb03c - std::panic::catch_unwind::h9af58d1941f17a40 at /rustc/07dca489ac2d933c78d3c5158e3f43beefeb02ce/library/std/src/panic.rs:142:14 24: 0x7cb03c - std::rt::lang_start_internal::{{closure}}::hb93b3739319681a0 at /rustc/07dca489ac2d933c78d3c5158e3f43beefeb02ce/library/std/src/rt.rs:148:48 25: 0x7cb03c - std::panicking::try::do_call::hdaaeb7ab86a42ac4 at /rustc/07dca489ac2d933c78d3c5158e3f43beefeb02ce/library/std/src/panicking.rs:552:40 26: 0x7cb03c - std::panicking::try::ha4a5aa32de9945d2 at /rustc/07dca489ac2d933c78d3c5158e3f43beefeb02ce/library/std/src/panicking.rs:516:19 27: 0x7cb03c - std::panic::catch_unwind::h403dd3017366017d at /rustc/07dca489ac2d933c78d3c5158e3f43beefeb02ce/library/std/src/panic.rs:142:14 28: 0x7cb03c - std::rt::lang_start_internal::h3242d8687092278a at /rustc/07dca489ac2d933c78d3c5158e3f43beefeb02ce/library/std/src/rt.rs:148:20 29: 0x43cc24 - main

** Hardware (please complete the following information):**

  • apple m2 air running kali linux on vmware
  • kali
  • Panda PAU0D (MediaTek Inc. MT7612U chipset)

thread 'main' panicked

thread 'main' panicked at src/main.rs:1118:9:
Channel is None. Current Frequency: Frequency { frequency: None, width: Some(ChanWidth20Noht), channel: None, pwr: Some(2000) }
note: run with RUST_BACKTRACE=1 environment variable to display a backtrace

To Reproduce
Steps to reproduce the behavior:
sudo angryoxide --whitelist ~/working/config/whitelist.txt --interface wlan0 -b 2,5

** Hardware (please complete the following information):**

  • vmware fusion kali
  • OS: Mac OS Big Sur m2 air
  • Interface: Panda PAU0D

Additional context
about 10 seconds into launching the application, main thread panics and app terminates with the above output

[Feature] Reinforcement Learning

I am the developer of one popular pwnagotchi.ai fork. I've been following AO and I am intrigued. I would like to proposal what I think would be a new feature for AO taken from pwnagotchi: Use reinforcement learning to optimize probing and attacks. This would enable AO to more intelligently sweep through the parameter space (e.g., channels, lengths of time to listen) to maximize the chances of collecting handshakes.

I'd love to help out time permitting. Happy to clarify my proposed enhancement/feature if its not clear.

Use on the go

Hi we using 7" display and getting "window too small" error obviously. We like to use it on the go is there any way around this.

Netlink failure

Hi,

From time to time I get this error in the output window. It does not appear to be a problem, but a hiccup that occurs and then continues to work as intended, however I thought I would share it with you anyway.

Error: "Netlink failure due to error: Wrapped IO error: No buffer space available (os error 105)

Screenshot: https://i.ibb.co/SQZBgr1/Screenshot-from-2024-01-25-09-52-50.png

I am using Alfa RTL8812AU Wifi adapters on my bare bones Kali Linux OS. Otherwise, it compiled with no issues, sees my GPS, and works as intended.

Thank You.

Crash on Pinephone Pro with Kali Linux Nethunter Pro

Hi,

I have this crash on Pinephone Pro with Kali Linux :

Attack Rate: Normal (2)
Setting wlani down.
Randomizing wlani mac to 18xxxxxx
Setting wlani to Monitor mode. ("active" flag: true)
Setting wlan1 up.
OUI Records Imported: 50153
thread 'main' panicked at src/rawsocks.rs: 138:43:
called Result:: unwrap()' on an 'Err" value: Other("Missing patch version component")
note: run with RUST_BACKTRACE=1 environment variable to display a backtrace

Latest kali linux nethunter pro and COMFAST CF926AC v2 (MT7612u), ALFA AWUS036ACS (RTL8812au), ALFA AWUS036ACM (MT7612u) i dont try other adapters.

Program crash with --band 5

Describe the bug
Program crashes when using --band 5, probably because the interface does not support all channels used by AngryOxide
.
To Reproduce

sudo angryoxide --interface wlo1 --band 5
Starting AngryOxide... ๐Ÿ˜ˆ
๐Ÿ’ฒ Interface Summary:
โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”“
โ”ƒ Interface: wlo1                                                                                  โ”ƒ
โ”ƒ Index: 3 | Driver: iwlwifi                                                                       โ”ƒ
โ”ƒ Mode: IftypeMonitor | Active Monitor: false                                                      โ”ƒ
โ”ƒ Modes: Adhoc, Station, Ap, ApVlan, Monitor, P2P Client, P2P Go, P2P Device                       โ”ƒ
โ”ƒ State: Unknown                                                                                   โ”ƒ
โ”ƒ Current Frequency: 5320 (5GHz 64)                                                                โ”ƒ
โ”ƒ Band2GHz:                                                                                        โ”ƒ
โ”ƒ     [2412 (1)]    [2417 (2)]    [2422 (3)]    [2427 (4)]    [2432 (5)]    [2437 (6)]             โ”ƒ
โ”ƒ     [2442 (7)]    [2447 (8)]    [2452 (9)]    [2457 (10)]    [2462 (11)]    [2467 (12)]          โ”ƒ
โ”ƒ     [2472 (13)]                                                                                  โ”ƒ
โ”ƒ                                                                                                  โ”ƒ
โ”ƒ Band5GHz:                                                                                        โ”ƒ
โ”ƒ     [5180 (36)]    [5200 (40)]    [5220 (44)]    [5240 (48)]    [5260 (52)]    [5280 (56)]       โ”ƒ
โ”ƒ     [5300 (60)]    [5320 (64)]    [5500 (100)]    [5520 (104)]    [5540 (108)]    [5560 (112)]   โ”ƒ
โ”ƒ     [5580 (116)]    [5600 (120)]    [5620 (124)]    [5640 (128)]    [5660 (132)]    [5680 (136)] โ”ƒ
โ”ƒ     [5700 (140)]    [5720 (142)]    [5745 (149)]    [5765 (153)]    [5785 (157)]    [5805 (161)] โ”ƒ
โ”ƒ     [5825 (165)]                                                                                 โ”ƒ
โ”ƒ                                                                                                  โ”ƒ
โ”ƒ                                                                                                  โ”ƒ
โ”—โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”›
๐Ÿ’ฒ No target list provided... everything is a target ๐Ÿ˜
๐Ÿ’ฒ No whitelist list provided.

======== Hop Channels ========
 โ”” Band 5 Channels:
   โ”œ 36
   โ”œ 40
   โ”œ 44
   โ”œ 48
   โ”œ 52
   โ”œ 56
   โ”œ 60
   โ”œ 64
   โ”œ 68
   โ”œ 72
   โ”œ 76
   โ”œ 80
   โ”œ 84
   โ”œ 88
   โ”œ 92
   โ”œ 96
   โ”œ 100
   โ”œ 104
   โ”œ 108
   โ”œ 112
   โ”œ 116
   โ”œ 120
   โ”œ 124
   โ”œ 128
   โ”œ 132
   โ”œ 136
   โ”œ 140
   โ”œ 142
   โ”œ 149
   โ”œ 153
   โ”œ 157
   โ”œ 161
   โ”œ 165
   โ”œ 169
   โ”œ 173
   โ”œ 177
   โ”” 181
==============================

๐Ÿ’ฒ Attack Rate: Normal (2)
๐Ÿ’ฒ Setting wlo1 down.
๐Ÿ’ฒ Randomizing wlo1 mac to 58324e148c6f
๐Ÿ’ฒ Setting wlo1 to Monitor mode. ("active" flag: false)
๐Ÿ’ฒ Setting wlo1 up.
๐Ÿ’ฒ OUI Records Imported: 50153
๐Ÿ’ฒ Sockets Opened [Rx: 5 | Tx: 6]
๐ŸŽฉ KICKING UP THE 4D3D3D3 ๐ŸŽฉ

======================================================================

thread 'main' panicked at /home/user/.cargo/registry/src/index.crates.io-6f17d22bba15001f/nl80211-ng-0.2.6/src/lib.rs:115:18:
called `Option::unwrap()` on a `None` value
stack backtrace:
   0: rust_begin_unwind
             at /rustc/82e1608dfa6e0b5569232559e3d385fea5a93112/library/std/src/panicking.rs:645:5
   1: core::panicking::panic_fmt
             at /rustc/82e1608dfa6e0b5569232559e3d385fea5a93112/library/core/src/panicking.rs:72:14
   2: core::panicking::panic
             at /rustc/82e1608dfa6e0b5569232559e3d385fea5a93112/library/core/src/panicking.rs:127:5
   3: nl80211_ng::Nl80211::set_interface_chan
   4: angryoxide::main
note: Some details are omitted, run with `RUST_BACKTRACE=full` for a verbose backtrace.

Expected behavior
Use only channels supported by the interface

Screenshots

** Hardware:**

  • Device: x86_64 GNU/Linux
  • OS: Ubuntu 22.04
  • Interface: Intel Corporation Wireless-AC 9462

Additional context
Supported Frequency list from adapter:

sudo iwlist wlo1 freq 
wlo1      32 channels in total; available frequencies :
          Channel 01 : 2.412 GHz
          Channel 02 : 2.417 GHz
          Channel 03 : 2.422 GHz
          Channel 04 : 2.427 GHz
          Channel 05 : 2.432 GHz
          Channel 06 : 2.437 GHz
          Channel 07 : 2.442 GHz
          Channel 08 : 2.447 GHz
          Channel 09 : 2.452 GHz
          Channel 10 : 2.457 GHz
          Channel 11 : 2.462 GHz
          Channel 12 : 2.467 GHz
          Channel 13 : 2.472 GHz
          Channel 36 : 5.18 GHz
          Channel 40 : 5.2 GHz
          Channel 44 : 5.22 GHz
          Channel 48 : 5.24 GHz
          Channel 52 : 5.26 GHz
          Channel 56 : 5.28 GHz
          Channel 60 : 5.3 GHz
          Channel 64 : 5.32 GHz
          Channel 100 : 5.5 GHz
          Channel 104 : 5.52 GHz
          Channel 108 : 5.54 GHz
          Channel 112 : 5.56 GHz
          Channel 116 : 5.58 GHz
          Channel 120 : 5.6 GHz
          Channel 124 : 5.62 GHz
          Channel 128 : 5.64 GHz
          Channel 132 : 5.66 GHz
          Channel 136 : 5.68 GHz
          Channel 140 : 5.7 GHz
          Current Frequency:5.32 GHz (Channel 64)

Channels that AngryOxide tries to use when --band 5 option is provided:

======== Hop Channels ========
 โ”” Band 5 Channels:
   โ”œ 36
   โ”œ 40
   โ”œ 44
   โ”œ 48
   โ”œ 52
   โ”œ 56
   โ”œ 60
   โ”œ 64
   โ”œ 100
   โ”œ 104
   โ”œ 108
   โ”œ 112
   โ”œ 116
   โ”œ 120
   โ”œ 124
   โ”œ 128
   โ”œ 132
   โ”œ 136
   โ”œ 140
   โ”œ 142
   โ”œ 149
   โ”œ 153
   โ”œ 157
   โ”œ 161
   โ”œ 165
   โ”œ 169
   โ”” 173
==============================

ERROR: GET_INTERFACE_STATUS 2

Describe the bug
Hard to say, I was running angryoxide on a raspi02w in the field, power bank as a power supply with a Panda AWUS036ACS adapter. I've noticed that when I power on the raspi in my lab, where the default wifi network is located and configured with raspi-config (on the internal wifi interface, wlan0) then configure angryoxide to run on the adapter (panda0) and leave the lab -- I've noticed errors when I return to the lab, back into the environment where the NetworkManager service manages the wlan0 (Broadcom) wifi interface. I suspect this is causing an issue.

Screenshots
I was able to pull this:

`2024-04-20 22:57:29 UTC | Info | Sending Deauth: 86763f91c5a8 => ffffffffffff
๐Ÿ’ฒ Cleaning up...

                                                                ..%%%%%
                                                      ...    .%%%%%%""
                                                   .%%%%%%%/%%%%%"
                                 .....           .%%%%%%%%%%%%%%\
                            ..:::::::::::..      :;""  {_}\%%/%%%%%%..
                          .:::::::::::::::::.            {_}/{_}%%%%%%%
                         :::::::::::::::::::::            \\//    """\::
                        :::::::::::::::::::::::           \\//

---------------------....-----..--.....~------\//----
-----
---
----
--__--.----...----...----..---__---\//----_
----------------...-----..--..---..-------\//-----____
---------------..--..-..----....-------\//-------
---
--------------..----------.--------\//-----
--
---
-
----------------------------\//------
----------
------ \//
--
--__--____ ' \// _
__--- @ , " {_}
. '

========== Error: (GET_INTERFACE_STATUS 2) Error response received from netlink: No such device (os error 19) ==========
๐Ÿ’ฒ Setting alfa0 down.
๐Ÿ’ฒ Restoring alfa0 MAC back to 00c0cab5b7a8.
๐Ÿ’ฒ Setting alfa0 to station mode.
๐Ÿ’ฒ Stopping Threads

๐Ÿ˜ˆ Results:
[SBG8300-783D] : 4wHS: 1 | PMKID: 0
[RingOfSecurity-sXJM2Bdi/] : 4wHS: 1 | PMKID: 0

๐Ÿ“ฆ Creating Output Tarball (oxide-2024-04-20_22-52-27.tar.gz).
Please wait...

Complete! Happy Cracking! ๐Ÿค™`

** Hardware (please complete the following information):**

  • raspberry pi zero 2 w
  • 5.15.44-Re4son-v7+ #1 SMP Debian kali-pi (2022-07-03) armv7l GNU/Linux
  • Interface: AWUS036ACS

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.