LinuxCommandLibrary

besside-ng-crawler

Identify hidden wireless networks

SYNOPSIS

besside-ng-crawler <capture_file>

PARAMETERS

capture_file
    Path to the .cap file generated by the besside-ng tool. This file contains the captured wireless network traffic from which WPS-related information will be extracted.

DESCRIPTION

The besside-ng-crawler command is a utility within the Aircrack-ng suite designed to process capture files generated by besside-ng. Its primary function is to 'crawl' or analyze these .cap files to extract information crucial for exploiting Wi-Fi Protected Setup (WPS) vulnerabilities. Specifically, it identifies and processes EAPOL (Extensible Authentication Protocol over LAN) packets and other data that contain WPS handshake elements, which can then be used to brute-force or recover WPS PINs. It streamlines the WPS attack process by consolidating relevant data from raw packet captures, making it easier to identify WPS-enabled access points and extract the necessary information for a WPS PIN cracking attempt. It acts as a data pre-processor for further WPS attacks.

CAVEATS

Dependency on besside-ng: This command requires capture files specifically generated by the besside-ng tool. Files from other capture tools may not contain the necessary format or data for successful processing.
WPS Specific: It is solely useful for networks utilizing WPS. If the target network does not have WPS enabled, or if WPS has been disabled, this tool will not yield useful information.
Data Quality: The effectiveness of besside-ng-crawler heavily relies on the quality and completeness of the captured data. Incomplete or corrupted captures may lead to inaccurate or no results.

TYPICAL WORKFLOW INTEGRATION

besside-ng-crawler typically fits into a larger WPS cracking workflow. First, airmon-ng is used to put the wireless adapter into monitor mode. Then, besside-ng is run to capture traffic and attempt to obtain WPS parameters and handshake data, saving it to a .cap file. Finally, besside-ng-crawler processes this .cap file to identify and extract the relevant WPS information for further analysis or brute-force attempts on the WPS PIN using other tools.

OUTPUT INFORMATION

The output of besside-ng-crawler generally provides a summary of detected APs, their BSSIDs, ESSIDs, and whether WPS information was successfully extracted. It helps in quickly identifying which WPS-enabled networks have enough captured data to proceed with a PIN cracking attempt.

HISTORY

besside-ng-crawler is an integral part of the Aircrack-ng project, a comprehensive suite of tools for auditing wireless networks. The Aircrack-ng suite itself is a continuation of the original Aircrack project. As Wi-Fi security evolved and new vulnerabilities like WPS were discovered, tools like besside-ng were developed to exploit these. besside-ng-crawler was introduced as a companion utility to process the specific capture formats and data generated by besside-ng, facilitating the automated extraction of WPS-related information. Its development is tied to the ongoing research and exploitation of WPS vulnerabilities within the wireless security community.

SEE ALSO

Copied to clipboard