|
1 | 1 | **Disclaimer**: I am not responsible for what you do with this tool or this information. The use of this tool should only be attempted on networks you own or have permission to test. please use this tool wisely.
|
2 | 2 |
|
3 |
| -# OneShot-Termux |
4 |
| -OneShot-Termux is a Implementation of [OneShot](https://github.com/drygdryg/OneShot) on Termux with DEB package, is a WiFi Hacking tool that allows to run WPS PIN attacks ([Pixie Dust](https://forums.kali.org/showthread.php?24286-WPS-Pixie-Dust-Attack-Offline-WPS-Attack) and bruteforce) without monitor mode with the wpa_supplicant, Originally made by @rofl0r and modded by @drygdryg (the original repository removed, somehow). |
| 3 | +# OneShot Termux |
| 4 | +OneShot Termux - Implementation of [OneShot](https://github.com/drygdryg/OneShot) on Termux with DEB package |
5 | 5 |
|
6 |
| -# Requirements |
| 6 | +WiFi pentesting tool that allows to run WPS PIN attacks ( [Pixie Dust](https://forums.kali.org/showthread.php?24286-WPS-Pixie-Dust-Attack-Offline-WPS-Attack) and bruteforce) without monitor mode with wpa_supplicant. |
| 7 | + |
| 8 | +## Features |
| 9 | +- [Pixie Dust attack](https://forums.kali.org/showthread.php?24286-WPS-Pixie-Dust-Attack-Offline-WPS-Attack); |
| 10 | +- integrated [3WiFi offline WPS PIN generator](https://3wifi.stascorp.com/wpspin); |
| 11 | +- [online WPS bruteforce](https://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf); |
| 12 | +- Wi-Fi scanner with highlighting based on iw; |
| 13 | + |
| 14 | +## Requirements |
7 | 15 | - An Android device with Termux installed
|
8 | 16 | - Root Access
|
9 | 17 | - Working brain with minimal cli knowledge 🧠
|
10 | 18 |
|
11 |
| -# Installation |
| 19 | +## Installation |
12 | 20 | ```shell
|
13 | 21 | apt update -y && apt upgrade -y
|
14 | 22 | apt install wget root-repo openssl -y
|
15 | 23 | wget https://github.com/Rem01Gaming/OneShot-Termux/releases/download/v1.0.1/oneshot.deb
|
16 | 24 | apt install ./oneshot.deb
|
17 | 25 | ```
|
18 | 26 |
|
19 |
| -# DEB package build |
| 27 | +## Usage |
| 28 | +```yaml |
| 29 | +OneShotPin 0.0.2 (c) 2017 rofl0r, moded by drygdryg, nikita-yfh, and Rem01Gaming |
| 30 | +oneshot <arguments> |
| 31 | + |
| 32 | +Required arguments: |
| 33 | + -i, --interface=<wlan0> : Name of the interface to use |
| 34 | + |
| 35 | +Optional arguments: |
| 36 | + -b, --bssid=<mac> : BSSID of the target AP |
| 37 | + -p, --pin=<wps pin> : Use the specified pin (arbitrary string or 4/8 digit pin) |
| 38 | + -K, --pixie-dust : Run Pixie Dust attack |
| 39 | + -B, --bruteforce : Run online bruteforce attack |
| 40 | + |
| 41 | +Advanced arguments: |
| 42 | + -d, --delay=<n> : Set the delay between pin attempts [0] |
| 43 | + -w, --write : Write AP credentials to the file on success |
| 44 | + -F, --pixie-force : Run Pixiewps with --force option (bruteforce full range) |
| 45 | + -X, --show-pixie-cmd : Always print Pixiewps command |
| 46 | + --vuln-list=<filename> : Use custom file with vulnerable devices list ['vulnwsc.txt'] |
| 47 | + --iface-down : Down network interface when the work is finished |
| 48 | + -l, --loop : Run in a loop |
| 49 | + -v, --verbose : Verbose output |
| 50 | + -m, --mtk-fix : MTK interface fix, turn off Wi-Fi to use this |
| 51 | + -r, --reverse-scan : Reverse sorting of networks in the scan. Useful on small displays |
| 52 | +``` |
| 53 | +
|
| 54 | +### Usage Examples |
| 55 | +#### Start Pixie Dust attack on a specified BSSID: |
| 56 | +```shell |
| 57 | +sudo oneshot -i wlan0 -b 00:90:4C:C1:AC:21 -K |
| 58 | +``` |
| 59 | +#### Show avaliable networks and start Pixie Dust attack on a specified network: |
| 60 | +```shell |
| 61 | +sudo oneshot -i wlan0 -K |
| 62 | +``` |
| 63 | + |
| 64 | +## Troubleshooting |
| 65 | +### "RTNETLINK answers: Operation not possible due to RF-kill" |
| 66 | + Just run: |
20 | 67 | ```shell
|
21 |
| -make pack-deb |
| 68 | +sudo rfkill unblock wifi |
22 | 69 | ```
|
| 70 | +### "Device or resource busy (-16)" |
| 71 | +Try disabling Wi-Fi in the system settings. Alternatively, you can try running OneShot with ```--iface-down``` argument. |
23 | 72 |
|
24 |
| -## Usage examples |
25 |
| -Start Pixie Dust attack on a specified BSSID: |
26 |
| - ```shell |
27 |
| - sudo oneshot -i wlan0 -b 00:90:4C:C1:AC:21 -K |
28 |
| - ``` |
29 |
| -Show avaliable networks and start Pixie Dust attack on a specified network: |
30 |
| - ```shell |
31 |
| - sudo oneshot -i wlan0 -K |
32 |
| - ``` |
33 |
| - |
| 73 | +## Acknowledgements |
| 74 | +Credits to contributor on this tool, the only thing I done is implementing this tool to Termux just like lego pieces :D |
| 75 | +### Special Thanks |
| 76 | +* `rofl0r` for initial implementation; |
| 77 | +* `Monohrom` for testing, help in catching bugs, some ideas; |
| 78 | +* `Wiire` for developing Pixiewps. |
| 79 | +* `nikita-yfh` for C version of OneShot |
| 80 | +* Other contributors on the tool development |
0 commit comments