Loading...

Attack Vector Security Software

Attack Vector is a Wireless and LAN Network Attack script I wrote for BackTrack 3 and later updated for use with BackTrack 4. I was working on updating it for compatability with BackTrack 5 when my first child was born. I have since retired all work on this project and it is no longer maintained or updated. The script allows one to scan, index and attack wireless and wired networks. Including such things as Secure Socket Layer MITM attacks, Wireless Encryption Code Cracking, Denial of Service, and Password Cracking.

The script was designed to facilliate easy use of complex command line attacks such as:

Function Breakdown

  • Wireless Interface Manipulation
    • Enable Monitor Mode
    • Disable Monitor Mode
    • Create Managed Mode
    • Destroy Managed Mode
  • Wireless Network Connections
    • WPA Connect
    • WEP Connect
    • Disconnect
  • Wireless Network Scanning
    • Kismet
    • FIFO (First In First Out)
    • RRobin (Round Robin)
    • HOL (Hop on Last)
    • AP-Specific (Access Point Specific)
    • Reveal-Hidden
  • Target Selection
    • Set
    • View
    • Change
    • Save
    • View Log
    • Set From Logs
    • Remove-Log-Entry
  • Wired and Wireless Attacks
    • LAN
      • SSLM (Secure Socket Layer Man-in-the-Middle)
      • SSHM (Secure Shell Host Man-in-the-Middle)
      • PTM (Plain Text Man-in-the-Middle)
      • Just Capture
    • DoS
      • AP-DeAuth (Access Point DeAuth)
      • CL-DeAuth (Client De-Auth)
  • WEP
    • DeAuth (DeAuthentication)
    • FakeAuth (Fake Authentication)
    • Fragmentation
  • WPA
    • Attack
    • PairWise Master Key Managment (Rainbow Tables)
      • ListDB
      • Import-Passwds
      • Import-ESSID
      • Clean
      • Verify
      • Process
      • Stats
    • Crack
  • Data Decoding
    • SSL-Decoder
    • WEP-Decoder
    • WPA-Decoder
  • LAN Scanning
    • Nmap
    • SNMP
  • MAC Address Manipulation
    • Change
    • View
  • Wireless Driver Manipulation
    • Display
    • Change