Thursday, May 9, 2024
Home Hacking News Airgeddon-Swiss Army WiFi Hacking Tool

Airgeddon-Swiss Army WiFi Hacking Tool

On initial inspection it seems to be the multi-purpose swiss army knife tool for WiFi hacking. This tool is totally free to download from Github and support multiple Linux based platforms.

What are the Functions of this tool?

These tools have multiple methodologies for hacking WiFi, Let’s see:

  • WEP all-in-one attack (Combining different methods: Caffe Latte, Chop-Chop, ARP Reply, Hirte, Fake association, Fragmentation, etc)
  • Multiple WPS cracking modes-Pixie Dust, Bully and Reaver
  • Evil Twin attacks(Rogue AP) with Hostapd+DoS+DHCP+Ettercap+Sslstrip and also BEEF support.
  • Offline password decrypting for WPA/WPA2 captured handshakes (Dictionary, brute force, and rule-based) based on aircraft, crunch, and hashcat tools.

Other features :

The other best feature 

  • Support for 2.45GHZ band to 5GHZ
  • Handshake file capturing feature.
  • Easy drag and drop options for windows operating system for entering file paths.
  • Cleaning task and temp files. restore the iptables after attack.option to keep monitor mode if the desired exit.

Platforms need to run :

The tools are much more compatible with any Linux OS that may need tools installed needed to run. If you use Kali Linux that would be the best candidate for running it. If you want some challenges just use Arch Operating System.

How Does it Look Like : 

As your expectation with any bash script related tool, if the tool provides the best menu and options that could allow even the best part and it will be easy to perform a wide range of Wifi attacks.

Conclusions :

This tool provides a wide range of options for perfosWiFi hacking. The best part is it is so simple and easy to manage. You can get by here.

Bipin Choudharyhttps://vednam.com
Bipin has been a passionate blogger for several years. He is a Cyber Security Enthusiast, Security Blogger, Technical Writer. He is always eager to know everything about the latest technology development and advancement. Author @ Vednam

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular

7 Best Free Ethical Hacking Courses Online

  Ethical hacking is the practice of identifying vulnerabilities in computer systems and networks, using the same techniques and tools as malicious hackers. Ethical hackers,...

How does AuKill malware work?

AuKill Malware Actively Used to Disable EDR in Ongoing Attacks The cybersecurity landscape is constantly evolving, and attackers are always finding new ways to breach...

What is Black box hacking ? How Does it works ?

  Black box hacking refers to the process of testing a system, network or application for vulnerabilities without having any prior knowledge of its internal...

What is Penetration testing ? How does it works ?

  Penetration testing, or PenTesting for short, is a critical part of any comprehensive cybersecurity program. It involves testing the security of computer systems, networks,...

Recent Comments