Monday, May 13, 2013

Aircrack-NGUI Becomes Educational


A feature has been added to Aircrack-NGUI that allows you to view the shell commands run to accomplish your tasks. There are several "modes" to the log:
  • Off: This is the default mode. No commands run are written against the hard disk.
  • Important: Only the real "action" commands are recorded. Any commands to build menu lists aren't recorded. Also known as "scripting mode" as it's the fastest way to make shell scripts in NGUI.
  • All: Also known as "paranoid mode". You want to know everything that NGUI is doing to your system.

These different modes can have several positive effects:
  • Educational. Do you want to know the different command arguments for what you're doing on the graphical end? Just do your pen testing with either Important (recommended) or All mode and view what the program is doing.
  • Script-building. Want a quick-and-easy way to break into your WEP-encrypted WiFi because your mom keeps changing the password? Break into it once and make a script out of it. No longer can she force you to do laundry to get your Internetz!

Release package to come later when I'm at my virtual machine.

Saturday, May 4, 2013

Dig Added to the NGUI Feature List


Heigh ho, heigh ho, it's off to look up DNS entries we go...

Dig, the DNS lookup entry tool, has been added to NGUI with profiles enabled. You can save dig lookup configurations and recall them at later time, as well as save the dig results to a HTML or TXT file. Please note that the current build may have display issues due to a major change of how profiles are handled in the background. After the next two feature implementations, that's next on my list to get fixed.

Download the latest version of Aircrack-NGUI here

Happy hacking!

Tuesday, April 16, 2013

Overview from Eli the Computer Guy


Aircrack-NGUI got an overview post from Eli the Computer Guy! The post was written by a fellow network security enthusiast Nullset Computers. Make sure to check it out and share the love!
Link to the article
More from Eli
More from Nullset

Monday, February 25, 2013

The Hackee Becomes the Hacker!


That's right, you saw the image correctly. Very strong strides are being made for Aircrack-NGUI to run on Windows! It won't be able to own your nemesis as well as its more penguin-y brother, but tools such as nmap and the basic networking tools can still work under NGUI. A new branch has been made in the repository for this change, so you don't need to download the Windows compatible version if you're running Linux. Once I've completed support, I'll merge the branches together again. Just be patient, Windows-users! Your time will come soon enough!

Tuesday, October 23, 2012

Nikto for Aircrack-NGUI

Nikto has been added to Aircrack-NGUI. It can be located under Other Tools->Nikto. It has a graphical interface for all Nikto options and has profiles support as well. You can download the latest version of Aircrack-NGUI here, or download the minimalistic version of NGUI here.

Saturday, September 29, 2012

Another Fresh Batch Of Updates!

...just like the kind my grandma used to make. Here's the latest updates on Aircrack-NGUI:
  • Renamed the forms to remove the Aircrack-NGUI prefix.
  • The form names went on a diet and slimmed down! (Ironic with the cookie image associated with this post) The form's titles no longer say "Aircrack-NGUI - <form name>", and instead just say "<form name>", for easier location on the menu bar.
  • Removed the button-and-menu layout and replaced with menus with hotkeys.
  • The button-and-menu layout is (mostly) gone! You now have a menu bar on the main page to navigate through the program and only open the windows you need. For example, opening a Ping window originally took several clicks and windows (Main Form->Other Tools (own window)->Basic Tools (own window)->Ping. You now click on the Other Tools menu, highlight on Basic Tools (another menu will pop up) and click Ping, so you're left with the main menu and the Ping window. I do have plans for the empty space on the main page, so just accept the eyesore for right now.
  • Fixed the output of Replay/Inject packets so it would rewrite the line on carriage returns with no line feed.
  • Essentially, I made the Replay/Inject Packets window output resemble the aireplay-ng output. There are a few bugs with this with ARP request replay, fragmentation, and chop-chop, but I'm working on it.
  • Added profiles option to Discover Networks.
  • This one's a big one. You can now create "profiles" in Discover Networks that save on your hard disk for you to pull up later. This is helpful if you have a certain setting in Discover Networks you want to use over-and-over but don't want to click on the checkboxes and fill out the text boxes each time. This is entirely optional and only saves profiles when you indicate so.
  • Moved the scripts to a better-named folder.
  • Moved the scripts that NGUI relies on from "Scripts" to "RequiredScripts". Not much more than that.
  • Added the Trace Route option
  • Trace Route! Woo hoo! You can now trace the route between your computer and an external (or internal) address. What makes this special? Well, Aircrack-NGUI displays it in a table which (you guessed it) you can right-click on individual rows and send data to other parts of the program. Very nice if you want to discover if a hop on a traceroute has ICMP echo responses enabled.
  • Started on the Settings screen with Preferred Interfaces.
  • This is another start but I'm working on the Settings screen, which will include options such as deleting all profiles, specifying "preferred" interfaces (automatically selected when a new form is populated), and much, much more.
  • Binaries.
  • The binaries to reflect the above updates as well.

Things are slowly improving and getting more user-friendly, especially with the release of profiles, which I plan to implement more across the system.

Click here to download the latest version of Aircrack-NGUI.

Happy hacking!

Monday, September 24, 2012

IP Tables, WPA Handshakes, and Metasploit, Oh My!

Another release for Aircrack-NGUI. Here's what this version entails:
  • Allow user to delete iptable entries under the FORWARD profile
  • When you click "Check IP Tables" on the ARP Poison Routing page, it would just tell you whether your IP tables will allow forwarding of packets through the rules. Now, instead of it going "boo hoo, open a terminal and clear your FORWARD rules," it offers to display another window on clearing out the rules. You need just select one and click Delete. Click OK to close the window and check again if your rules pass for an ARP Poison Routing attack.
  • Display captured WPA handshake in table
  • The Discover Networks page now has a HANDSHAKE column that will read "YES" when a handshake is captured for a network. Please note that until I can get a patched version of airodump-ng, networks with the same first 5 octets will read "YES" at the same time, even though a handshake may only be captured for one of them.
  • Metasploit and Armitage feature in Other Tools.
  • Before I get a flame war started on this, I'm not actually incorporating a full-fledged Metasploit GUI built by yours truly. This is merely a "quick page" to do common functions with Metasploit. These being, run msfupdate, msfconsole, msfgui, and Armitage. That's all it does.
I hope you enjoy this latest release of Aircrack-NGUI!

Click here to download the hacking sensation that's sweeping the nation.