Description
- avoid_airmon.sh: This plugin disables airmon-ng to be used to start and stop monitor mode on an interface.
iw
will be used instead. - multint.sh: This plugin enables Airgeddon to use more than one interface to be used with Captive Portal attack. By default, Airgeddon uses
Virtual Interface
method on supported chipsets to create monitor mode and master mode required to run captive portal attack. For users who do not have a fully compatible chipset, they can use this plugin to use multiple cards that support monitor and master mode one per card to run captive portal attack. - nogui.sh: This plugin voids the requirement of xterm or tmux for evil twin attack. This plugin only works with Evil Twin attack with Captive Portal method (Option 9 in Evil Twin attacks menu)
- custom_essid.sh: This plugin allows you to specify custom name for a target AP with hidden SSID, after discovering it with deauth attack.
- mass_handshake_capture.sh: This plugin allows you to mass capture Handshake/PMKID from nearby WPA networks. After downloading the plugin to the airgeddon/plugins directory, run airgeddon, select interface and put the card into monitor mode and then goto
Handshake/PMKID/Decloaking tools menu
and choose Option10. Mass Handshake/PMKID Capture
and then follow the instructions. There are some variables that can be set according to the needs. Open the plugin file and see the top section. The minimum required airgeddon version is now 11.40. In the new update this plugin allows you to save the AP details(essid, bssid, channel, encryption and handshake/PMKID file location) whose handshake has been captured. You can use this file to automatically start Evil Twin captive portal attack using airgeddon_cli.sh plugin which takes the file as an argument and starts the evil twin attack. - airgeddon_cli.sh This plugin enables command line interface for airgeddon evil twin with captive portal attack. It can work in two ways, one is to specify just the vif capable interface and a file containing essid, bssid, channel, encryption type and handshake/PMKID file location. The plugin will then start the evil twin attack using the provided values in the file. All other options will be set to default and can be edited from the plugin. The second method to use the plugin is to specify the bssid, essid, channel, encryption type, handshake/PMKID file path, vif capable interface and any other desired values as command line arguments. The detailed usage info can be found by downloading the plugin and then running
bash airgeddon.sh -u
If no command line arguments are passed, airgeddon will start normally.
Usage
Just download and copy the plugin file to the plugins folder inside airgeddon directory. Please do not rename any plugin file. After copying the file, just run airgeddon as you normally would and the plugin will do its job.