Table of Contents
Airdrop-ng
A Rule Based Wireless Deauth Tool
Description
airdrop-ng is a program used for targeted, rule-based deauthentication of users. It can target based on MAC address, type of hardware, (by using an OUI lookup, IE, “APPLE” devices) or completely deauthenticate ALL users. lorcon and pylorcon are used in the transmission of the deauth packets.
Dependencies
Supports Python 2.6 and may support 2.5 and 2.4.
Dependencies:
- lorcon-old aka lorcon version 1 (already installed on BT4 final)
- pylorcon
- A lorcon supported wireless card with monitor mode and injection
Optional Dependencies:
- pysco JIT
Installing lorcon
Currently we only support the older version of lorcon you can download these files from the following svn link:
svn co http://802.11ninja.net/svn/lorcon/branch/lorcon-old
If pylorcon reports import errors you need to run the following command:
ln -s /usr/local/lib/liborcon-1.0.0.so /usr/lib
This will create a symlink to the directory that pylorcon looks in for liborcon.
If you are on ubuntu you will also need to install the python-dev package as they do not include the headers
Usage
airdrop-ng [options] <pcap file>
Option | Param. | Description |
---|---|---|
-i | card | Wireless card in monitor mode to inject from |
-t | csv file | Airodump txt file in CSV format NOT the pcap |
-p | psyco | Disable the use of Psyco JIT |
-r | Rule File | Rule File for matched deauths |
-u | update | Updates OUI list |
-d | Driver | Injection driver. Default is mac80211 |
-s | sleep | Time to sleep between sending each packet |
-b | debug | Turn on Rule Debugging |
-l | key | Enable Logging to a file, if file path not provided airdrop will log to default location |
-n | nap | Time to sleep between loops |
Usage Examples
Start airdrop-ng on mon0 reading from airodump.csv and kick on the rules in rulefile.txt
airdrop-ng -i mon0 -t airodump.csv -r rulefile.txt
Rule File Configuration Examples
#[comments] #All lines in this page are commented out # The # symbol at the front of a line denotes a commented line #airdrop-ng.py rule configuration file #a is allow #d is deny #format is (a or d)/bssid|(any or client mac or list of client macs in format of mac1,mac2,mac3) #it is not wise to mix rule types for example #d/any|00:17:AB:5C:DE:3A,00:1B:63:00:60:C4,apple #While it may work i have no idea result it will have and at this time is not recommended #EX d/bssid|mac1,mac2 #note this is not a valid rule just shows format the / and | placement do matter #MORE EXAMPLE RULES #d/00:1F:90:CA:0B:74|00:18:41:75:8E:4B #deny rule with a single client #d/any|00:21:E9:3D:EB:45,00:17:AB:5C:DE:3A,00:1B:63:00:60:C4 #a deny rule for several clients on any AP #d/any|any #a global deny any any rule #A/00:17:3F:3A:F0:7E|00:21:E9:3D:EB:45,00:17:AB:5C:DE:3A,00:1B:63:00:60:C4 #an allow rule with multiple clients #D/00-1E-58-00-FF-5E|00:19:7E:9A:66:96 #another deny rule with a different mac format #d/12:02:DC:02:10:00|any #a bssid deny any client rule #a/any|any #a global allow, no idea why you would wanna use this ;) #oui examples #d/any|Apple, Inc;APPLE COMPUTER;APPLE COMPUTER, INC.;Apple Computer Inc.;APPLE COMPUTER INC.;APPLE, INC #d/any|apple #d/action|broadcom #kicks only broadcom devices off actiontech routers #d/00:1F:3C|any #kicks all clients that match that oui #d/action|00:1F:3C kick any clinets off an actiontec router that match the oui #d/action|00:21:E9:3D:EB:45,00:17:AB:5C:DE:3A,00:1B:63:00:60:C4 #kick the following clients off an any actiontech router #d/00:17:3F:3A:F0:7E|apple kick any apple device off that ap