2018-08-03 12:56:15 -06:00
|
|
|
#!/usr/bin/env bash
|
|
|
|
|
|
|
|
if [ "$HashUtilsVersion" ]; then return 0; fi
|
|
|
|
readonly HashUtilsVersion="1.0"
|
|
|
|
|
|
|
|
HashOutputDevice="/dev/stdout"
|
|
|
|
|
|
|
|
function hash_check_handshake() {
|
|
|
|
local -r handshakeVerifier=$1
|
|
|
|
local -r handshakePath=$2
|
|
|
|
local -r handshakeAPSSID=$3
|
|
|
|
local -r handshakeAPMAC=$4
|
|
|
|
|
|
|
|
echo "Verifier Parameters: " > $HashOutputDevice
|
|
|
|
echo " Verifier: $handshakeVerifier" > $HashOutputDevice
|
|
|
|
echo "Hash Path: $handshakePath" > $HashOutputDevice
|
|
|
|
echo "Hash SSID: \"$handshakeAPSSID\"" > $HashOutputDevice
|
|
|
|
echo " Hash MAC: $handshakeAPMAC" > $HashOutputDevice
|
|
|
|
|
|
|
|
local analysis # Since it's being used in all relevant instances.
|
|
|
|
|
|
|
|
case "$handshakeVerifier" in
|
|
|
|
"pyrit")
|
|
|
|
readarray analysis < <(pyrit -r "$handshakePath" analyze 2> $HashOutputDevice)
|
|
|
|
if [ "${#analysis[@]}" -eq 0 -o $? != 0 ]; then
|
|
|
|
echo "Error: pyrit seems to be broken!" > $HashOutputDevice
|
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
|
|
|
|
local hashMeta=$(echo "${analysis[@]}" | grep -F "AccessPoint ${handshakeAPMAC,,} ('$handshakeAPSSID')")
|
|
|
|
|
|
|
|
if [ "$hashMeta" ]; then
|
|
|
|
local hashID=$(echo "$hashMeta" | awk -F'[ #:]' '{print $3}')
|
|
|
|
local hashData=$(echo "${analysis[@]}" | awk "\$0~/#$hashID: HMAC_(SHA[0-9]+_AES|MD5_RC4)/{ print \$0 }")
|
|
|
|
else
|
|
|
|
echo "No valid hash meta was found for \"$handshakeAPSSID\"" > $HashOutputDevice
|
|
|
|
fi
|
|
|
|
;;
|
|
|
|
"aircrack-ng")
|
|
|
|
readarray analysis < <(aircrack-ng "$handshakePath" 2> $HashOutputDevice)
|
|
|
|
if [ "${#analysis[@]}" -eq 0 -o $? != 0 ]; then
|
|
|
|
echo "Error: aircrack-ng seems to be broken!" > $HashOutputDevice
|
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
|
|
|
|
local hashData=$(echo "${analysis[@]}" | grep -E "${handshakeAPMAC^^}\s+" | grep -F "$handshakeAPSSID")
|
|
|
|
;;
|
|
|
|
"cowpatty")
|
|
|
|
readarray analysis < <(aircrack-ng "$handshakePath" 2> $HashOutputDevice)
|
|
|
|
if [ "${#analysis[@]}" -eq 0 -o $? != 0 ]; then
|
|
|
|
echo "Error: cowpatty (aircrack-ng) seems to be broken!" > $HashOutputDevice
|
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
|
|
|
|
if echo "${analysis[@]}" | grep -E "${handshakeAPMAC^^}\s+" | grep -qF "$handshakeAPSSID"; then
|
|
|
|
local hashData=$(cowpatty -cr "$handshakePath")
|
|
|
|
fi
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
echo "Invalid verifier, quitting!" > $HashOutputDevice
|
|
|
|
return 1
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
|
|
|
|
if [ -z "$hashData" ]; then
|
|
|
|
echo "Handshake for $handshakeAPSSID ($handshakeAPMAC) is missing!"
|
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
|
|
|
|
case "$handshakeVerifier" in
|
|
|
|
"pyrit")
|
|
|
|
if echo "$hashData" | grep -qF "good"; then
|
|
|
|
local -r hashResult=1
|
|
|
|
fi ;;
|
|
|
|
|
|
|
|
"aircrack-ng")
|
2019-12-28 15:18:30 -07:00
|
|
|
if echo "$hashData" | grep -qE "\(1 handshake\)"; then
|
2018-08-03 12:56:15 -06:00
|
|
|
local -r hashResult=1
|
|
|
|
fi ;;
|
|
|
|
|
|
|
|
"cowpatty")
|
|
|
|
if echo "$hashData" | grep -q "Collected all necessary data to mount crack against WPA2/PSK passphrase."; then
|
|
|
|
local -r hashResult=1
|
|
|
|
fi ;;
|
|
|
|
esac
|
|
|
|
|
|
|
|
if [ -z "$hashResult" ]; then
|
|
|
|
echo "Invalid hash for $handshakeAPSSID ($handshakeAPMAC)!" > $HashOutputDevice
|
|
|
|
HASHCheckHandshake="invalid"
|
|
|
|
return 1
|
|
|
|
else
|
|
|
|
echo "Valid hash for $handshakeAPSSID ($handshakeAPMAC)!" > $HashOutputDevice
|
|
|
|
HASHCheckHandshake="valid"
|
|
|
|
fi
|
|
|
|
}
|