Pi-pwnbox-rogueap vs Airgeddon
Detailed comparison of features, pros, cons, and usage
Pi-pwnbox-rogueap is a specialized Raspberry Pi-based rogue access point toolkit, while airgeddon is a more comprehensive multi-use bash script for auditing wireless networks; pi-pwnbox-rogueap offers a dedicated hardware solution but is less flexible, whereas airgeddon provides broader functionality across different systems but may require more setup and configuration.
Homemade Pwnbox :rocket: / Rogue AP :satellite: based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap :bulb:
Pi-pwnbox-rogueap Pros and Cons
Pros
- Provides a comprehensive set of tools for wireless penetration testing and network security auditing
- Designed specifically for Raspberry Pi, making it a portable and cost-effective solution
- Includes automated setup scripts, simplifying the installation and configuration process
- Supports various wireless attack techniques, including rogue access points and man-in-the-middle attacks
Cons
- May be used for malicious purposes if not handled responsibly
- Requires technical knowledge to use effectively, which may be challenging for beginners
- Could potentially interfere with legitimate wireless networks if not used carefully
- May not be legal to use in certain jurisdictions or without proper authorization
Airgeddon Pros and Cons
Pros
-
Comprehensive Wi-Fi auditing tool: airgeddon offers a wide range of features for wireless network security testing, making it a versatile tool for penetration testers and security researchers.
-
Active development: The project is regularly updated and maintained, ensuring compatibility with the latest wireless technologies and security standards.
-
User-friendly interface: Despite its powerful capabilities, airgeddon provides a relatively easy-to-use interface, making it accessible to both beginners and advanced users.
-
Extensive documentation: The repository includes detailed documentation and a wiki, helping users understand and utilize the tool's features effectively.
Cons
-
Potential for misuse: As with any powerful security tool, airgeddon could be used maliciously by individuals with harmful intentions.
-
Limited cross-platform support: The tool is primarily designed for Linux-based systems, which may limit its accessibility for users of other operating systems.
-
Dependency on external tools: airgeddon relies on various external tools and dependencies, which may complicate the installation process and increase the potential for compatibility issues.
-
Legal and ethical considerations: Users must be cautious about using the tool in compliance with local laws and regulations, as unauthorized network testing can be illegal in many jurisdictions.
Pi-pwnbox-rogueap Code Examples
Rogue AP Setup
This snippet demonstrates how to set up a Rogue Access Point using the project's scripts:
sudo ./1_rogueap_setup.sh wlan0 wlan1 MyEvilAP
sudo ./2_rogueap_captiveportal.sh
sudo ./3_rogueap_start.sh
Capturing Credentials
The following code shows how to capture and display credentials from the captive portal:
def display_credentials():
with open('/tmp/credentials.txt', 'r') as f:
creds = f.readlines()
for cred in creds:
print(cred.strip())
while True:
display_credentials()
time.sleep(5)
Wi-Fi Deauthentication Attack
This snippet illustrates how to perform a Wi-Fi deauthentication attack using the project's tools:
sudo ./wifi_deauth.sh wlan0 00:11:22:33:44:55 FF:FF:FF:FF:FF:FF 0
Airgeddon Code Examples
Wireless Interface Selection
This snippet demonstrates how the script allows users to select a wireless interface for performing attacks:
function select_interface() {
debug_print
if [ ${#wireless_interfaces[@]} -eq 1 ]; then
interface=${wireless_interfaces[0]}
echo -e "${green_color}Only one wireless interface detected. Using ${interface}${normal_color}"
return 0
fi
echo -e "${green_color}Select the wireless interface to use:${normal_color}"
i=0
for item in "${wireless_interfaces[@]}"; do
echo -e "${green_color}$i) ${item}${normal_color}"
i=$((i + 1))
done
}
Evil Twin Attack Setup
This snippet shows how the script sets up an Evil Twin attack:
function et_setup() {
debug_print
if [[ "${current_menu}" != "evil_twin_attacks" ]]; then
return 1
fi
echo
language_strings "${language}" 91 "title"
language_strings "${language}" 296 "green"
echo
language_strings "${language}" 297 "yellow"
language_strings "${language}" 298 "yellow"
echo
}
Handshake Capture
This snippet illustrates the process of capturing a WPA handshake:
function capture_handshake() {
debug_print
rm -rf "${tmpdir}handshake"* > /dev/null 2>&1
recalculate_windows_sizes
manage_output "+j -bg \"#000000\" -fg \"#FF0000\" -geometry ${g1_topright_window} -T \"Capturing Handshake\"" "airodump-ng -c ${channel} --bssid ${bssid} -w \"${tmpdir}handshake\" ${interface}" "Capturing Handshake" "active"
if [ "${AIRGEDDON_WINDOWS_HANDLING}" = "xterm" ]; then
et_xterm_pid=$!
fi
}
Pi-pwnbox-rogueap Quick Start
Installation
-
Clone the repository:
git clone https://github.com/koutto/pi-pwnbox-rogueap.git
-
Change to the project directory:
cd pi-pwnbox-rogueap
-
Install the required dependencies:
sudo apt-get update sudo apt-get install -y hostapd dnsmasq iptables
Basic Usage
-
Configure the settings: Edit the
config.ini
file to set your desired network name, password, and other options. -
Run the setup script:
sudo python3 setup.py
-
Start the rogue access point:
sudo python3 rogue_ap.py
Example
Here's a basic example of how to create a rogue access point named "Free WiFi" with no password:
-
Edit the
config.ini
file:[AccessPoint] ssid = Free WiFi password = channel = 6 interface = wlan0
-
Run the setup and start the access point:
sudo python3 setup.py sudo python3 rogue_ap.py
This will create an open Wi-Fi network named "Free WiFi" on channel 6 using the wlan0
interface.
Airgeddon Quick Start
Installation
-
Clone the repository:
git clone https://github.com/v1s1t0r1sh3r3/airgeddon.git
-
Change to the airgeddon directory:
cd airgeddon
-
Make the script executable:
chmod +x airgeddon.sh
Basic Usage
-
Run the script with root privileges:
sudo ./airgeddon.sh
-
Follow the on-screen menu to select your desired attack or tool.
Example: Scanning for Wi-Fi Networks
- From the main menu, select option 1 for "Explore for targets".
- Choose your wireless interface from the list.
- Wait for the scan to complete and view the results.
Requirements
Ensure you have the following dependencies installed:
- Bash (>= 4.2)
- Wireless tools (iwconfig, ifconfig, etc.)
- Aircrack-ng suite
- xterm
- curl
You can install most of these on Debian-based systems using:
sudo apt-get install aircrack-ng curl xterm
For a complete list of dependencies and compatibility, refer to the official documentation.
Top Related Projects
The Rogue Access Point Framework
Pros of Wifiphisher
- User-friendly with a simple command-line interface
- Supports multiple attack vectors and phishing scenarios
- Actively maintained with regular updates
Cons of Wifiphisher
- Limited to Wi-Fi attacks, less versatile than Pi-pwnbox-rogueap or Airgeddon
- Requires more manual configuration compared to Airgeddon's guided approach
- May have compatibility issues with certain wireless adapters
Code Comparison
Wifiphisher (Python):
def start(self):
initial_checks.check_root()
initial_checks.check_dependencies()
self.network_manager.start()
self.template_manager = phishingpage.TemplateManager()
self.access_point = accesspoint.AccessPoint()
Airgeddon (Bash):
function initialize_script_settings() {
debug_mode=0
language_strings
initialize_colors
initialize_script_fonts
set_default_values
}
Pi-pwnbox-rogueap (Bash):
setup_network_manager() {
systemctl stop NetworkManager
systemctl disable NetworkManager
systemctl mask NetworkManager
}
DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3
Pros of WiFi-Pumpkin
- User-friendly graphical interface for easier operation
- Extensive set of built-in attack modules and plugins
- Cross-platform compatibility (Linux, macOS, Windows)
Cons of WiFi-Pumpkin
- Less frequently updated compared to airgeddon
- May require more system resources due to GUI
- Fewer community contributions and extensions
Code Comparison
WiFi-Pumpkin (Python):
class PumpkinProxy(ProxyPlugin):
def __init__(self):
super(PumpkinProxy, self).__init__('pumpkinproxy')
self.reactor = None
pi-pwnbox-rogueap (Bash):
start_hostapd() {
hostapd /etc/hostapd/hostapd.conf > /dev/null 2>&1 &
sleep 2
}
airgeddon (Bash):
function set_interface_mode() {
if [ "${1}" = "monitor" ]; then
${airmon} start "${interface}" > /dev/null 2>&1
fi
}
WiFi-Pumpkin offers a more structured, object-oriented approach with its Python codebase, while pi-pwnbox-rogueap and airgeddon utilize Bash scripting for system-level operations. airgeddon's code appears more modular and function-based compared to pi-pwnbox-rogueap's straightforward script structure.
Fluxion is a remake of linset by vk496 with enhanced functionality.
Pros of Fluxion
- User-friendly interface with a more polished look and feel
- Specialized in social engineering attacks against Wi-Fi networks
- Supports multiple languages for wider accessibility
Cons of Fluxion
- More limited in scope compared to pi-pwnbox-rogueap and airgeddon
- May require more setup and dependencies for certain features
- Less frequently updated than airgeddon
Code Comparison
Fluxion
#!/usr/bin/env bash
source lib/InterfaceUtils.sh
source lib/ColorUtils.sh
source lib/LanguageUtils.sh
airgeddon
#!/usr/bin/env bash
source "$AIRGEDDON_PATH/known_pins.txt"
source "$AIRGEDDON_PATH/language_strings.sh"
source "$AIRGEDDON_PATH/plugins.sh"
pi-pwnbox-rogueap
#!/usr/bin/env python3
from core.Utils import *
from core.Bcolors import *
from core.Menu import *
Fluxion focuses on bash scripting with modular source files, similar to airgeddon. pi-pwnbox-rogueap uses Python, offering a different approach to structuring the project. airgeddon appears to have more extensive plugin support, while Fluxion and pi-pwnbox-rogueap have more specialized functionality. All three projects emphasize modularity and organization in their code structure.
This is a multi-use bash script for Linux systems to audit wireless networks.
Pros of airgeddon
- More comprehensive wireless auditing toolkit with a wider range of attack options
- Active development and regular updates
- Large community support and extensive documentation
Cons of airgeddon
- Steeper learning curve due to more complex features
- Requires more system resources compared to simpler tools
Code Comparison
airgeddon:
function check_xterm_installed() {
debug_print
if ! hash xterm 2>/dev/null; then
echo_error "xterm is not installed. Install it and try again"
exit_code=1
exit_script_option
fi
}
pi-pwnbox-rogueap:
def check_dependencies():
for dep in DEPENDENCIES:
if not shutil.which(dep):
print(f"[!] {dep} is not installed. Please install it and try again.")
sys.exit(1)
Summary
airgeddon offers a more feature-rich and actively maintained wireless auditing toolkit compared to pi-pwnbox-rogueap. It provides a wider range of attack options and benefits from strong community support. However, this comes at the cost of a steeper learning curve and higher resource requirements. The code comparison shows different approaches to dependency checking, with airgeddon using bash functions and pi-pwnbox-rogueap utilizing Python.
*DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM
Pros of mana
- More comprehensive set of attack tools and techniques
- Better documentation and setup instructions
- Active development and community support
Cons of mana
- Steeper learning curve for beginners
- Requires more system resources
- Less focused on Raspberry Pi compatibility
Code comparison
mana:
#!/bin/bash
source config.rc
start_noupstream
start_hostapd
start_dhcp
pi-pwnbox-rogueap:
#!/bin/bash
source config.sh
setup_interface
start_hostapd
start_dnsmasq
airgeddon:
#!/usr/bin/env bash
source libs/lib_general
initialize_script_settings
load_language
The code snippets show initialization processes for each tool. mana and pi-pwnbox-rogueap have similar approaches, while airgeddon uses a more modular structure with separate library files.
mana offers a wider range of attack vectors and better documentation, making it suitable for advanced users. However, it may be more challenging for beginners and requires more resources. pi-pwnbox-rogueap and airgeddon are more focused on specific use cases and may be easier to set up, especially on Raspberry Pi devices.