Skip to content

AirStrike is an advanced wireless security assessment framework designed to simplify and enhance Wi-Fi penetration testing through an integrated, web-based interface.

License

Notifications You must be signed in to change notification settings

mahmoud-sadder/AirStrike

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

84 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

                            _     _        ____   _          _  _
                           / \   (_) _ __ / ___| | |_  _ __ (_)| | __  ___ 
                          / _ \  | || '__|\___ \ | __|| '__|| || |/ / / _ \
                         / ___ \ | || |    ___) || |_ | |   | ||   < |  __/
                        /_/   \_\|_||_|   |____/  \__||_|   |_||_|\_\ \___|

AirStrike is a Flask + Socket.IO web interface for orchestrating Wi-Fi assessment tools from a browser.
This build intentionally focuses on the three most stable attacks in the suite: Deauthentication, Cracking (handshake capture + aircrack-ng), and Evil Twin.

Supported Attacks

  • Deauthentication – kicks associated clients off the selected AP by flooding crafted 802.11 deauth frames.
  • Cracking (Handshake) – captures WPA/WPA2 handshakes while simultaneously brute-forcing them with aircrack-ng and a configurable wordlist.
  • Evil Twin – clones the target SSID via hostapd/dnsmasq, sets up DHCP/DNS spoofing, and can optionally front a captive portal.

All other experimental attack stubs were removed to keep the UI, API, and code paths lean.

Requirements

  1. Python 3.10+ and pip
  2. Python deps from requirements.txt
    python -m venv .venv
    source .venv/bin/activate
    pip install -r requirements.txt
  3. Root access (AirStrike refuses to start otherwise)
  4. External CLI tooling available in $PATH:
    • aircrack-ng suite (airmon-ng, airodump-ng, aircrack-ng)
    • iw, ip, ifconfig/net-tools
    • hostapd, dnsmasq, iptables, dnsspoof
    • A wireless adapter that supports monitor mode and injection

Running AirStrike

sudo python run.py

The runner enforces sudo, exports the required environment variables, and ensures /etc/hosts contains 127.0.0.1 airstrike.local.
The server binds to 0.0.0.0:5000; browse to http://airstrike.local:5000.
Use the Scan tab to discover networks, select one, then switch to Attack to configure the chosen attack.
Live logs and capture summaries are available under Results.

Configuration Notes

  • Global defaults (interface, wordlist path, capture directory) live in web/shared.py under the config dict:
    config = {
        'interface': 'wlan0',
        'wordlist': '/usr/share/wordlists/rockyou.txt',
        'output_dir': './captures/'
    }
  • Captured handshakes are stored per-BSSID inside captures/.
  • run.py is the single entry point; it handles root enforcement, host mapping for airstrike.local, and Socket.IO startup logs.

Repository Layout

  • attacks/ – Python workers for deauth, handshake capture/cracking, and evil twin orchestration.
  • web/ – Flask blueprints, Socket.IO events, templates, and front-end modules (per-attack config lives in web/static/js/modules/attacks/).
  • utils/ – helpers for interface/monitor-mode management.
  • run.py – entry point that enforces root execution and prepares the environment.

Troubleshooting

  • Interface stuck in monitor mode? Use the Settings → Interface tools or utils/network_utils.set_managed_mode.
  • Missing binaries (e.g., airodump-ng, hostapd) will surface in the attack log pane. Install them through your package manager and restart AirStrike.
  • Ensure your wireless chipset supports the required modes; USB adapters with Atheros or Ralink chipsets are typically reliable.

Disclaimer

AirStrike is intended for lab use, red-team exercises, and research on networks you own or are explicitly authorized to test. Misuse may violate law or policy—operate responsibly.

About

AirStrike is an advanced wireless security assessment framework designed to simplify and enhance Wi-Fi penetration testing through an integrated, web-based interface.

Topics

Resources

License

Stars

Watchers

Forks

Contributors 2

  •  
  •