This project is an automated Wi-Fi security testing tool that runs on a Raspberry Pi. It continuously jams a target Wi-Fi network and attempts to crack its WPA/WPA2 password using a dictionary attack.
This tool is intended for educational and authorized security testing purposes only. Unauthorized use of this tool to attack Wi-Fi networks is illegal. The authors are not responsible for any misuse of this software.
- Automated Deauthentication: Continuously sends deauthentication packets to disrupt the target Wi-Fi network.
- WPA/WPA2 Handshake Capture: Automatically captures WPA/WPA2 handshakes after deauthenticating a client.
- Dictionary-Based Password Cracking: Uses
aircrack-ngwith a provided wordlist to crack the captured handshake. - Autonomous Operation: Designed to run on a Raspberry Pi from boot, powered by a power bank for portable use.
- Systemd Service: Includes a systemd service file for easy setup to run on boot.
- Raspberry Pi 4 Model B (1GB RAM)
- Monitor Mode Capable Wi-Fi Adapter
- Power Bank (e.g., 10000 mAh) for portable operation
- Kali Linux for Raspberry Pi
- Aircrack-ng Suite (pre-installed on Kali Linux)
- Python 3
- Flash Kali Linux: Install Kali Linux on an SD card and boot your Raspberry Pi.
- Clone the Repository:
git clone https://github.com/chimms1/Standalone-WiFi-JCH.git cd Standalone-WiFi-JCH - Configure the Target Network:
- Edit the
wifi_config.txtfile and enter the SSID of the target Wi-Fi network.
- Edit the
- Install the Systemd Service:
- Copy the
hacking.servicefile to the systemd directory:sudo cp systemd/hacking.service /etc/systemd/system/
- Enable the service to start on boot:
sudo systemctl enable hacking.service - Start the service immediately:
sudo systemctl start hacking.service
- Copy the
Once the setup is complete, the script will run automatically on boot. The Raspberry Pi can be powered by a power bank for portable and autonomous operation.
The script will perform the following cycle:
- Jam the target Wi-Fi network for 15 seconds.
- Attempt to capture a handshake and crack the password for 1 minute.
The results of the password cracking attempts will be logged in the cracked_passwords.txt file in the scripts directory.
The minimalfinal0.py script orchestrates the attack using the Aircrack-ng suite:
airmon-ng: Puts the Wi-Fi adapter into monitor mode.airodump-ng: Scans for the target network to get its BSSID and channel.aireplay-ng: Sends deauthentication packets to clients on the network.airodump-ng: Captures the WPA/WPA2 handshake when a client reconnects.aircrack-ng: Attempts to crack the captured handshake using therockyou.txtwordlist.
- Implement proper exception handling for a more robust script.
- Add support for multiple wordlists.
- Incorporate a web interface for easier configuration and monitoring.
- Add functionality to automatically hop channels to find the target network.