Skip to content

Commit

Permalink
0.7.4
Browse files Browse the repository at this point in the history
  • Loading branch information
Ragnt committed Jan 17, 2024
1 parent 06c3c5a commit 2a55771
Show file tree
Hide file tree
Showing 3 changed files with 8 additions and 6 deletions.
2 changes: 1 addition & 1 deletion Cargo.lock

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

4 changes: 2 additions & 2 deletions Cargo.toml
Original file line number Diff line number Diff line change
Expand Up @@ -2,9 +2,9 @@
members = ["libs/libwifi", "libs/libwifi_macros", "libs/pcap-file"]

[workspace.package]
version = "0.7.3"
version = "0.7.4"
authors = ["Ryan Butler"]
description = "80211 Attack Platform"
description = "80211 Attack Tool"
license = "MIT"
edition = "2021"
rust-version = "1.62"
Expand Down
8 changes: 5 additions & 3 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,8 @@

AngryOxide was developed as a way to learn Rust, netlink, kernel sockets, and WiFi exploitation all at once.

You can get information about how to use the tool in the [User Guide](https://github.com/Ragnt/AngryOxide/wiki/User-Guide).

NOTE: This project is under HEAVY development and you can expect a very fast release cycle.

The overall goal of this tool is to provide a single-interface survey capability with advanced automated attacks that result in valid hashlines you can crack with [Hashcat](https://hashcat.net/hashcat/).
Expand All @@ -18,14 +20,13 @@ This tool is heavily inspired by [hcxdumptool](https://github.com/ZerBea/hcxdump

You can download pre-compiled binaries of AngryOxide in the [releases](https://github.com/Ragnt/AngryOxide/releases/latest).

More architectures will be added as I confirm there is no endianess-related issues associated with them.

You can get information about how to use the tool in the [User Guide](https://github.com/Ragnt/AngryOxide/wiki/User-Guide).

## Features

- Active state-based attack engine used to retrieve relevent EAPOL messages from Access Points and clients.
- Target option that accepts MAC (aabbcc..., aa:bb:cc...) and SSID "Test_SSID" to limit attack scope.
- Whitelist option to protect specific networks from attacks. Useful if not using targets.
- Auto Hunt capability to find all target channels and hop between them.
- A Terminal-UI that presents all relevent data while still living in the terminal for easy usage over SSH.
- Limits DEAUTHENTICATION frames that can cause more damage than good to the authentication sequence.
Expand Down Expand Up @@ -54,7 +55,7 @@ All of these attacks are rate-controlled both to prevent erroneous EAPOL timer r
## Help

```bash
sudo angryoxide --help
❯ angryoxide --help
Does awesome things... with wifi.

Usage: angryoxide [OPTIONS] --interface <INTERFACE>
Expand All @@ -64,6 +65,7 @@ Options:
-c, --channel <CHANNEL> Optional - Channel to scan. Will use "-c 1 -c 6 -c 11" if none specified
-b, --band <BAND> Optional - Entire band to scan - will include all channels interface can support
-t, --target <TARGET> Optional - Target (MAC or SSID) to attack - will attack everything if none specified
-w, --whitelist <WHITELIST> Optional - Whitelist (MAC or SSID) to NOT attack
-o, --output <OUTPUT> Optional - Output filename
-r, --rogue <ROGUE> Optional - Tx MAC for rogue-based attacks - will randomize if excluded
--gpsd <GPSD> Optional - Alter default HOST:Port for GPSD connection [default: 127.0.0.1:2947]
Expand Down

0 comments on commit 2a55771

Please sign in to comment.