Commit Graph

11 Commits

Author SHA1 Message Date
6a5dd1141c Update probenpwn.py
Aggressively capture handshakes with two modes: Tactical (smart and efficient) and Maniac(unrestricted, rapid attacks). Enhanced with client scoring, adaptive attacks, ML-based channel hopping, intelligent retries, and resource management.
2025-05-05 23:12:09 -07:00
fcfb8a29d4 Update probenpwn.py
Fixed the issue where Attack and Success coordinates were not updating correctly from the config.toml file
2025-03-30 16:53:42 -07:00
6cc1e7e6c1 Update probenpwn.py
Key Features (Enhanced from v1.1.2)

ProbeNpwn v1.1.3 builds on the solid foundation of v1.1.2, enhancing these core features:

    Efficient Attacks: Launch both simultaneously for maximum handshake potential.

    Concurrent Attack Threads: Handle multiple networks and clients with multi-threading.

    Dynamic Attack Tuning: Adjusts delays and aggression based on signal strength and performance.

    Whitelist Support: Exclude specific networks or clients from attacks via config.toml.
    Comprehensive Logging: Detailed logs track every attack and capture.

    Watchdog Recovery: Monitors and restarts Pwnagotchi if the Wi-Fi interface fails.

    Lightweight Integration: Seamlessly works with your existing Pwnagotchi setup.

    Real-Time UI Feedback: Displays attack counts and successes on your Pwnagotchi screen.
2025-03-16 20:16:21 -07:00
8aecbf3e55 - move toml reading by standard function on_config_changed()
- removed unecessary _agent and _ui
- properly exit watchdog loop (_watchdog_thread_running + join)
- retreive debug log path from config
- simplify name changing
- remove sudo as pwnagotchi is already root
2025-02-23 02:02:21 +01:00
bb3f8cbf56 Update probenpwn.py
Now uses /etc/pwnagotchi/config.toml whitelist no need to use this anymore: main.plugins.probenpwn.whitelist = ["00:11:22:33:44:55", "TrustedNetwork"]
2025-02-19 19:47:37 -08:00
de0187818d Update probenpwn.py 2025-02-18 01:57:55 -08:00
f5e9ddd05a Update probenpwn.py
Dynamic Attack Strategy: The plugin now adjusts the aggressiveness of its attacks based on real-time performance, leading to better handling of different APs and more successful attacks.

    Enhanced Logging and Feedback: The plugin logs success and failure rates for handshakes, providing clear insight into its effectiveness. The added performance stats help in tuning attack strategies over time.

    Improved Robustness: The watchdog is more resilient, with checks for additional errors (e.g., missing wifi.interface) and the ability to restart the service when necessary.

    Adaptability: By adjusting the attack parameters based on success rates, the plugin can adapt its behavior, making it more intelligent and resource-efficient.

Overall, this version is more intelligent and self-correcting. It can now analyze its own performance and adjust its strategies dynamically, leading to better overall efficiency and fewer failed attacks over time. It’s also more robust in dealing with errors, ensuring smoother operation in case of interface or service failures.
2025-02-18 01:57:39 -08:00
fec64b1905 Update probenpwn.py
What's New in Probenpwn 1.1.0:
Dynamic Parameter Tuning:

    The dynamic_attack_delay method now adjusts the attack delay based not only on the client’s signal strength but also on the number of previous attack attempts for a given AP (Access Point). As the number of attacks increases, the delay between attacks decreases slightly, making the attacks more aggressive while preventing the system from overloading.
    The delay is further randomized with random.uniform(0.9, 1.1) to prevent detection by automated systems that might look for consistent attack patterns.

Watchdog Thread for Recovery:

    The plugin introduces a watchdog thread that periodically checks for the presence of the wlan0mon interface, which is essential for monitoring Wi-Fi networks. If this interface is missing (likely due to a Wi-Fi adapter crash), the watchdog attempts to restart the Pwnagotchi system automatically by running a systemctl restart command, providing a more robust recovery mechanism.

Tracking and Limiting Attack Attempts:

    The plugin now tracks the number of attack attempts for each AP using a dictionary (attack_attempts). If an AP has been attacked more than a certain number of times, the delay for subsequent attacks is adjusted to prevent excessive and repetitive attacking, reducing the risk of detection.
    This approach helps balance the aggressiveness of the attacks with performance considerations, ensuring that the plugin remains effective over extended periods.

Tracking Successful Handshakes:

    The plugin now also tracks the number of successful handshakes captured per AP with the success_counts dictionary. Each time a handshake is successfully captured, the count for that AP is incremented. This can be useful for monitoring attack success rates and potentially adjusting attack strategies based on success frequency.

Improved Device Handling:

    The handling of new and updated APs and clients is more refined. The plugin ensures that each device (AP or client) is only attacked if it's not on the whitelist. Devices are also tracked more effectively with better time management, ensuring that only recently seen devices are targeted.
    The track_recent method tracks both APs and clients, with more granular control over when devices should be removed from the recent list based on activity.

Channel Sanitization:

    The plugin includes a new sanitize_channel_list method, which ensures that only valid Wi-Fi channels (1-14 for 2.4 GHz and 36-165 for 5 GHz) are included in the scan list. This prevents attempts to scan invalid channels and ensures more efficient use of scanning resources.

Enhanced Logging and Error Handling:

    The plugin now includes more detailed logging, especially around the dynamic attack delay, attack attempts, and handshakes. The logging makes it easier to monitor the plugin's behavior and diagnose issues.
    It also improves error handling by catching and logging exceptions in key methods, ensuring that the plugin can gracefully handle unexpected issues without crashing.
2025-02-12 22:29:51 -08:00
e483baa1ea Update probenpwn.py 2025-02-02 23:12:40 -08:00
fbfaf470a2 Update probenpwn.py 2025-02-02 17:29:54 -08:00
1e586cb5e6 Create probenpwn.py
More aggressive, simultaneous attacks thanks to multithreading, which allows you to target multiple APs and clients at once.

Dynamic attack delays based on signal strength, ensuring more efficient attacks and better targeting of weak or strong signals.

Greater handshake capture success rate through dual attacks (deauth + association) and a refined attack strategy that adapts to real-time conditions.

Full control over your attack strategy, including the ability to exclude specific networks and clients via whitelists.

Enhanced logging for better tracking of every handshake capture and attack attempt, providing deeper insights into your progress.
2025-02-02 17:15:19 -08:00