- Notifications
You must be signed in to change notification settings - Fork11
📡 802.11 broadcast analyzer & injector
License
ANDRVV/gapcast
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
An IEEE 802.11 packet injector and analyzer software📡
Use it with-radar!
🔧ForGNU/Linux:
git clone https://github.com/ANDRVV/gapcast.gitcd gapcastgo build -buildvcs=false./gapcast -i<interface>
❄️Or, you can install Gapcast from Nix-Os Packages
The Injection table is a table where you can insert data and perform an attack or injection.
Advantages:
- You don't need to specify the channel.
- You don't need to specify the BSSID.
- Multiple synchronized attacks.
- Quick and easy attack initialization.
- Interface with attack information.
For more infoclick here.
The Single Deep Scanning feature focuses on a single target, splitting the scan into three phases. By using the BSSID alone, you can obtain a wide range of information.
Step 1: detect the channel of the AP or STA.
Step 2: collects the packets that are exchanged.
Step 3: arrange the data and calculate the distance based on different antennas.
For more infoclick here.
🚀Soon be updated! It will give more stuff!
By utilizing the INJ Table, you can initiate Evil Twin mode. After selecting the appropriate parameters, the attack will commence. One adapter, if available, will deauthenticate the victim's AP, while the second adapter will establish a rogue AP equipped with aCaptive Portal system. This setup allows for the collection of credentials if theLogIn page templates are configured.
For more infoclick here.
For each driver there is a correctsequence of commands to start the network card correctly in monitor mode.Drivers supported by gapcast can also have a txpower modification, bug fixing etc. If the driver is not supported, it will start monitor mode directly withairmon-ng.
Supported drivers:
RTL88XXAU
mon+txpowerR8187
mon+bugfixRTL8812CU
monRTL8821CU
mon
Important
If your driver is not supported or if you would like to boot into monitor mode with your changes, just do so before starting gapcast.If gapcast recognizes that the interface has already set monitor mode, it will not make any changes or even try to restart monitor mode.
./gapcast -i<iface> -2.4+5g -d
Note
Scans all 2.4/5 Ghz channels disabling shifting of inactive devices.
./gapcast -i<iface> -2.4+5g -c 10,36 -p 03:e9:58:65:2a:8
Note
Access Point that have 5 Ghz and 2.4 Ghz transmit via 2 different addresses, the address for 5 Ghz and the one for 2.4 Ghz. In most cases these 2 addresses have a Mac address with a very similar prefix:
In this case of selecting channel 10 for 2.4 Ghz and channel 36 for 5 Ghz with-c <channel>
uses 2 channels with different bands, using-2.4+5g
. Taking into consideration anAccess Point that has the 5 Ghz address03:e9:58:65:2a:8e and the 2.4 Ghz address03:e9:58:65:2a:86, thecommon prefix is03:e9:58:65:2a:8, which is set via-p <mac-prefix>
.With this parameteronly devices with that specified prefix will be displayed.
./gapcast -i<iface> -2.4+5g -radar
Note
Scan all 2.4/5 Ghz channels showing the approximate radius of the location in meters with the-radar
parameter using theRadarRSSI library,more info.
./gapcast -i<iface>
Note
Scans all 2.4 channels.
./gapcast -i<iface> -5g
Note
Scans all 5 Ghz channels adding-5g
parameter.
./gapcast -i<iface> -2.4+5g -w out.pcap
Note
Scans all 2.4/5 Ghz channels, recording it and saving to a pcap file. Registration can be done by adding the-w <file>.pcap
parameter.
./gapcast -i<iface> -c 11 -b a3:65:1b:56:7e:3c -w out.pcap
Note
Scan only AP's channel (11) to get the best WPA 4-Way Handshake, To deauthenticate you need to open the gapcast injection table by pressing[CTRL-P], then select the De-Auth type, enter the required information and start the attack by pressingCTRL-D key for a few seconds (check that clients are present via the light-blue bar), as soon as theCTRL-D key is deactivated, the clients that reconnect to theAccess Point:
Willsend and receive EAPOL packets which you will record and save with the-w <file>.pcap
parameter.
./gapcast -l out.pcap
Note
If you want to restore data from a previous scan, done withgapcast,wireshark or other tools and load them on thegapcast table to better analyze the data, just insert the-l <file>.pcap
parameter, if you want to restore the data and continue the scan you must add the-i <iface>
parameter and/or add other additional parameters.
./gapcast -i<iface> -2.4+5g -beacon
Note
If you want to show or record only theAccess Points you must enter the-beacon
parameter. For this technique, where we show allAccess Points of all channels it is necessary to add the parameter-2.4+5g
.
💻Happy hacking!😊
Caution
You must installlibpcap
,libx11
,apache2
,iptables
,hostapd
,dnsmasq
,aircrack-ng
,php
, if you'd usegapcast!
- New attack from INJ Table
About
📡 802.11 broadcast analyzer & injector