Script to parse Aircrack-ng captures into a SQLite database, get handshakes (in 22000 hashcat format)and extract MGT identities.
2
+
Script to parse Aircrack-ng captures into a SQLite database, get handshakes (in 22000 hashcat format), extract MGT identities,getinterestingrelationsbetweenAPs,clientsandit'sProbes,getWPSinformationandhaveaglobalviewofalltheAPsseen.
3
3
4
4
```
5
5
_ __ _ _ _
skipped 4 lines
10
10
|_____|
11
11
by r4ulcl
12
12
```
13
+
14
+
## Features
15
+
16
+
- Displays if a network is cloaked (hidden) even if you have the ESSID.
17
+
- Shows a detailed table of connected clients and their respective APs.
18
+
- Identifies client probes connected to APs, providing insight into potential security risks usin Rogue APs.
19
+
- Extracts handshakes for use with hashcat, facilitating password cracking.
20
+
- Displays identity information from enterprise networks, including the EAP method used for authentication.
21
+
- Generates a summary of each AP group by ESSID and encryption, giving an overview of the security status of nearby networks.
22
+
- Provides a WPS info table for each AP, detailing information about the Wi-Fi Protected Setup configuration of the network.
23
+
- Logs all instances when a client or AP has been seen with the GPS data and timestamp, enabling location-based analysis.
24
+
- Upload files with capture folder or file. This option supports the use of wildcards (*) to select multiple files or folders.
25
+
- Docker version in Docker Hub to avoid dependencies.
26
+
- Obfuscated mode for demonstrations and conferences.