Cleven

(System Configuration Dialog)
(System Configuration Dialog)
Line 63: Line 63:
[[Image:cleven_systemConfiguration.png|280px]]
[[Image:cleven_systemConfiguration.png|280px]]
-
The same configuration dialog can be accessed at the end of the attack (from the [[#Drop down menu|Drop down menu]])to revert the settings.  
+
The same configuration dialog can be accessed at the end of the attack (from the [[#Drop down menu|Drop down menu]]) to revert the settings.  
The default system MAC address will be restored automatically when the drivers get unloaded.
The default system MAC address will be restored automatically when the drivers get unloaded.

Revision as of 22:09, 9 August 2011

The Cleven application is a user interface to the aircrack-ng for the N900 device.

It provides the ability to easily configure the injection drivers, scan for surrounding stations, and, using injection and authentication or deauthentication, capture Identification Vector keys.

In addition, it provides interfaces to decrypt the captured files and manage the successful attacks.

It has been created with PyQT (PyQt v4.7.5 for Python v2.6) and the functionality is provided by Python.

Contents

Installation

The application can be installed directly by the Application Manager (HAM) from the Extras repositories (check here for its status).

Dependencies

Included

The application depends on:

  • python2.5
  • python2.5-qt4-gui
  • python2.5-qt4-core
  • python2.5-qt4-maemo5
  • aircrack-ng
  • macchanger

Expected

In order to load the bleading edge drivers it expects an equivalent kernel. Currently possible power kernels include:

  • 46-wl
  • 47

Key features

  • Includes the injection drivers (courtesy of lxp).
  • Original MAC is stored and restored on exit.
  • Handles correctly spaces and special characters in the Network names
  • The Network names are sorted and the hidden are not shown.
  • Decryption can be done for data captured over multiple sessions.
  • Successful decrypted keys are stored in a separate folder.

Usage

Startup Dialog

Staring

System Configuration Dialog

As soon as the application starts the System Configuration dialog is shown.

It is recommended to set the Internet Connection Setting to ASK so that the system does not try to connect while the system tries to use the monitor mode.

The next steps will be to load the injection drivers and enable the monitor mode.

The MAC address can be also changed to a random one or in the case of MAC filtering by the Access Point to an already connected.

The same configuration dialog can be accessed at the end of the attack (from the Drop down menu) to revert the settings.

The default system MAC address will be restored automatically when the drivers get unloaded.

Main Window

Decryption Window

The "Decryption Window" sorts files alphabetically and by security type.

Using the "All Common" button it is instructs the decryption to consider all files captured from the same network on different sessions.

Deletion of files

From the Decryption window and pressing the menubar will provide the option to enable the "Deletion Mode". While in this mode, pressing the menubar again will give the opposite option, i.e. exit from the mode.

The "Deletion Mode" keeps the same appearance as the parent window and sorts files alphabetically and by security type.

Using the "All Common" button it is possible to delete all files captured from the same network.

Keys Management Window

Drop down menu

The drop down menu, aka Menubar, will offer the following options:

  • Button: About
  • Button: Quit

About

In the about window one can find the version of the application running as well as buttons to connect to additional documentation (like all the rest of the windows it supports rotation).

Versions

License

This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; version 2 only.

Disclaimer

This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.

Also, this program is intended for learning purposes only. I do not condone hacking and wouldn't be held responsible for your actions. Only you would face legal consequences if you used this script for illegal activities.