Skip to content

p0dalirius/crEAP

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

crEAP

crEAP is a python script that will identify WPA Enterprise mode EAP types and if insecure protocols are in use, will attempt to harvest usernames and/or handshakes.
GitHub release (latest by date)

Features

  • Analyze packets from a PCAP capture file (option --read).
  • Sniff packet in live mode on a specific interface.

Usage

$ ./crEAP.py -h
usage: crEAP.py [-h] [--debug] [--no-colors] [-l LOGFILE] [-r PCAP] [-i INTERFACE] [-c CHANNEL]

Description message

optional arguments:
  -h, --help            show this help message and exit
  --debug               Debug mode.
  --no-colors           No colors mode.
  -l LOGFILE, --logfile LOGFILE
                        Log file to save output to.
  -r PCAP, --read PCAP  [OPTIONAL] Read from PCAP file, else live capture is default.
  -i INTERFACE, --interface INTERFACE
                        [OPTIONAL] Wireless interface to capture.
  -c CHANNEL, --channel CHANNEL
                        [OPTIONAL] Wireless channel to monitor. 2.4/5GHZ spectrums supported so long as your
                        adapter supports it. The ALFA AWUS051NHv2 is recommended for dual band support.

Credits

This tool was initially developped in 2015 by @Snizz and @Shellntel. I refactored the code and ported it to python3 in October 2021.

Contributing

Pull requests are welcome. Feel free to open an issue if you want to add other features.

References

About

crEAP will identify WPA Enterprise mode EAP types and harvest usernames and/or handshakes if insecure protocols are in use.

Topics

Resources

Stars

Watchers

Forks

Packages

No packages published

Languages