Tuesday, July 24, 2012

Crack WEP/WPA Keys Feature Added!

The Crack WEP/WPA Keys section of Aircrack-NGUI's initial release is finished! It allows you to use the .ivs or .cap files that is generated by airodump-ng (Discover Networks feature) and attempt to strip a password out of it (WEP), or brute-force it with password dictionary (WPA/WPA2). Please note: I do not condone the use of this feature on networks that you do not have approval to crack. If you do, it is illegal and you could face criminal penalties. You have been warned. Enjoy this section of Aircrack-NGUI! Next up, building and manipulating network dictionary databases (airolib-ng)!

Thursday, July 19, 2012

Discover Hosts Feature Added!

The Discover Hosts section of Aircrack-NGUI's initial release is finished! It allows for three different scan modes (Standard, SYN, and OS (Operating System)). It shows all the commonly needed information (Device Type, Host Name, IP Address, MAC Address, Manufacturer, Latency, and Open Ports). It still has a lot of work to do on it, but good enough at this point to be usable.

Monday, July 16, 2012

Aircrack-NGUI Is Now On BitBucket!

The Aircrack-NGUI source code is now available on BitBucket! Just go to the following address:

https://bitbucket.org/pbromwelljr/aircrack-ngui/

Follow the steps on the site to getting your repository set up. Happy coding!