TechnicalUserX / proximoth

Control Frame Attack Vulnerability Detection Tool (GitLab Mirror)

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Proximoth

Control Frame Attack Vulnerability Detection Tool

Proximoth performs Control Frame Attack, which lets the attacker find out whether the target device is in range, in other words: presence detection.

More Info About Control Frame Attack:


Installation By Building

Required Packages To Compile

  • libpcap-dev
  • gcc
  • make
  • gzip
$ sudo apt-get install libpcap-dev gcc make gzip

Installation

$ git clone https://github.com/TechnicalUserX/proximoth.git
$ cd proximoth
$ make
$ sudo make install

Put The Interface In Monitor Mode (Obligatory)

wlan0 name may vary depending on your operating system. Sometimes, it may look like wlp2s0 or wlx6a4cdd56f9b1.

#Put the interface into monitor mode
$ sudo ip link set wlan0 down
$ sudo iw wlan0 set type monitor
$ sudo ip link set wlan0 up

#To put the interface back to managed mode
$ sudo ip link set wlan0 down
$ sudo iw wlan0 set type managed
$ sudo ip link set wlan0 up

Set Interface Channel (Optional)

<channel> is arbitrary, like 2 or 11. Available channels depend on your Wi-Fi antenna. You might want to change the channel of your interface in scenarios which the default channel is in heavy disturbance by other Wi-Fi devices.

$ sudo iw wlan0 set channel <channel>

Channel numbers are generally between 1 and 11.

Usage

Example Usages

$ sudo proximoth -i wlan0 10:DA:41:E8:FA:DC

$ sudo proximoth -i wlan0 10:DA:41:E8:FA:DC --dump-file dump --out-file record

$ sudo proximoth -i wlan0 10:DA:41:E8:FA:DC --rts-interval 100000

$ sudo proximoth -i wlan0 10:DA:41:E8:FA:DC -b 1C:CC:D6:00:00:00

General Usage Information

Usage: proximoth [options] <target>

 <target>                            : MAC address of the target.

options:

 -h, --help                          : Prints this screen.

 -o <file>, --out-file <file>        : File to write statistics after shutdown.

 -b <bssid>, --bssid <bssid>         : Custom BSSID to be injected as sender MAC address.
                                       Address is fixed automatically to be global and unicast.

 -a, --no-mac-autofix                : Disables unicast/global auto fix for BSSID MAC addresses.

 -i <iface>, --interface <iface>     : Wireless interface to use packet injection and sniffing.
                                       Obligatory option.

 -d <file>, --dump-file <file>       : Write all CTS captures to a PCAP file.

 -r <us>, --rts-interval <us>        : Microseconds as threshold to wait between RTS injections.
                                       Setting it to a low value might cause malfunction.
                                       Default: 500000

 -t, --text-mode                     : Enables text only mode.

 --version                           : Prints version number and author information.

Docker Containers

Building And Running

$ git clone https://github.com/TechnicalUserX/proximoth.git
$ cd proximoth
$ sudo docker build -t proximoth .
$ sudo docker run --tty --rm --network=host proximoth -i wlan0 XX:XX:XX:XX:XX:XX

Pulling From Docker Hub

$ sudo docker pull technicaluserx/proximoth:latest
$ sudo docker run --tty --rm --network=host technicaluserx/proximoth -i wlan0 XX:XX:XX:XX:XX:XX

Disclaimer

This software is distributed in the hope that it will be useful, but without a warranty. No responsibility will be taken for any illegal activity, use it at your own risk.

About

Control Frame Attack Vulnerability Detection Tool (GitLab Mirror)

License:GNU General Public License v2.0


Languages

Language:C 90.8%Language:Makefile 5.2%Language:C++ 3.1%Language:Shell 0.5%Language:Dockerfile 0.4%