Plugins for airgeddon
An airgeddon plugin to fix some problematic Realtek chipsets.
This plugin for airgeddon tool, fix the non-standard behavior of some drivers for some Realtek chipsets used on many wireless cards.
List of the compatible working cards can be found at airgeddon
Wiki here. If you are having troubles with your card using airgeddon
and your chipset is listed below, keep reading.
For now, the known list of chipsets that this plugin fix to be used flawlessly with airgeddon
tool is:
- Realtek RTL8188EU <- present in TP-Link TL-WN722N (2.4Ghz - USB)
- Realtek RTL8812AU <- present in Alfa AWUS036ACH (2.4Ghz/5Ghz - USB)
- Realtek RTL8812BU <- present in Comfast CF-913AC (2.4Ghz/5Ghz - USB)
- Realtek RTL8814AU <- present in Alfa AWUS1900 (2.4Ghz/5Ghz - USB)
There are more cards and devices using the chipsets listed here. We listed only some examples of cards containing these chipsets.
This plugin was designed to be used on airgeddon v10.0 and is not needed if you are using airgeddon v10.01 or higher because since that version, the compatibility problem was already addressed by default.
It is already explained on airgeddon
Wiki on this section with more detail. Anyway, summarizing, it consists in just copying the .sh
plugin file to the airgeddon's plugins directory.
Plugins system feature is available from airgeddon>=10.0
.
Basically, this fix for the listed Realtek cards the ability to switch mode from monitor to managed and viceversa from airgeddon menus.
Known problems even using the plugin depending of your driver version and Kernel:
- WPS wash scanning
- DoS during Evil Twin attacks (while the interface is splitted into two logical interfaces)
This known problems are not related to airgeddon and can't be fixed on airgeddon's side. They are directly related to driver capabilities so for now they can't be fixed.
If you have any other wireless card with a different Realtek chipset which is also messing up with airgeddon, feel free to contact me by IRC or on #airgeddon channel at Discord. Join clicking on the Public Invitation link.
An airgeddon plugin to decreases security to accept any char as part of the password for Evil Twin Captive Portal attack.
This plugin is for airgeddon tool. To avoid injections on the Captive Portal, airgeddon
by default is filtering some dangerous chars *&/?<>
as a part of the password while using Evil Twin Captive Portal attack. That might the attack to fail if the password of the target network is using one of these filtered chars. Using this plugin, any character will be accepted as part of the password.