gh0stshell 83705c27f5
Updated depends, bmaptool check update
Removed bmap-tools from depends as the check on line 96 looks for bmaptools and would use it if available if not continue to build, but have it as a depend check made the check null and if someone is on a kernel/file-system that does not support SEEK_HOLE and SEEK_DATA the script just fails.

Fixed bmap-tools check as the line which bmaptool >/dev/null 2>&1 does not return 0 so it kept ending at this line, if bmap-tools were not installed

The original code below looks for sparse to be 0 and if which bmaptool >/dev/null 2>&1 returns 0 to use bmap-tools, but I think its the reverse so swapped the last then and else sections as it would then look if sparse is 0 and which bmaptool >/dev/null 2>&1 is 0 to not use bmap-tools, but if it is 1 to use bmap-tools. If tool is available = 1 use bmap-tools, if tools is unavailable=0 do not use bmap-tools:

if [ "${OPT_SPARSE}" -eq 0 ];
  then
    which bmaptool >/dev/null 2>&1
    if [ $? -eq 0 ];
    then
      echo "[+] Defaulting to sparse image generation as bmaptool is available"
      OPT_SPARSE=1
2019-10-03 16:19:47 -07:00
2019-10-03 17:20:58 +02:00
2019-10-03 17:44:07 +01:00
2019-10-04 00:28:49 +02:00
2019-10-04 00:00:47 +02:00
2019-10-03 16:59:19 +02:00
2019-10-03 15:08:22 +01:00
2019-10-04 00:27:05 +02:00
2019-09-19 15:15:46 +02:00
2019-10-02 20:25:56 +01:00
2019-10-03 21:47:34 +02:00

Pwnagotchi

Release Software License Travis

Pwnagotchi is an "AI" that learns from the WiFi environment and instruments bettercap in order to maximize the WPA key material (any form of handshake that is crackable, including PMKIDs, full and half WPA handshakes) captured.

handshake

Specifically, it's using an LSTM with MLP feature extractor as its policy network for the A2C agent, here is a very good intro on the subject.

Instead of playing Super Mario or Atari games, pwnagotchi will tune over time its own parameters, effectively learning to get better at pwning WiFi things. Keep in mind: unlike the usual RL simulations, pwnagotchi learns over time (where a single epoch can last from a few seconds to minutes, depending on how many access points and client stations are visible), do not expect it to perform amazingly well at the beginning, as it'll be exploring several combinations of parameters ... but listen to it when it's bored, bring it with you and have it observe new networks and capture new handshakes and you'll see :)

Multiple units can talk to each other, advertising their own presence using a parasite protocol I've built on top of the existing dot11 standard, by broadcasting custom information elements. Over time, two or more units learn to cooperate if they detect each other's presence, by dividing the available channels among them.

Why

For hackers to learn reinforcement learning, WiFi networking and have an excuse to take a walk more often. And it's cute as f---.

Documentation

License

pwnagotchi is made with ♥ by @evilsocket and the amazing dev team. It's released under the GPL3 license.

Description
(⌐■_■) - Deep Reinforcement Learning instrumenting bettercap for WiFi pwning. (forked from https://github.com/evilsocket/pwnagotchi cloned from https://github.com/scifijunk/pwnagotchi converted fork to be a fork of https://github.com/aluminum-ice/pwnagotchi)
Readme 9 MiB
Languages
JavaScript 59.1%
Python 25.1%
CSS 13.8%
HTML 1%
Shell 0.5%
Other 0.4%