All Projects → techge → eewids

techge / eewids

Licence: GPL-3.0 license
Easily Expandable Wireless Intrusion Detection System

Programming Languages

python
139335 projects - #7 most used programming language
shell
77523 projects
Dockerfile
14818 projects

Projects that are alternatives of or similar to eewids

Aircrack Ng
WiFi security auditing tools suite
Stars: ✭ 2,690 (+10660%)
Mutual labels:  wifi, wifi-security
wifivoid
Ruby script for continuously jam all wifi clients and access points within range
Stars: ✭ 91 (+264%)
Mutual labels:  wifi, wifi-security
Pi.alert
WIFI / LAN intruder detector. Check the devices connected and alert you with unknown devices. It also warns of the disconnection of "always connected" devices
Stars: ✭ 209 (+736%)
Mutual labels:  wifi, ids
Wifi Passview
An open source batch script based WiFi Passview for Windows!
Stars: ✭ 157 (+528%)
Mutual labels:  wifi, wifi-security
kismon
A GUI client for kismet
Stars: ✭ 72 (+188%)
Mutual labels:  wifi, kismet
Probequest
Toolkit for Playing with Wi-Fi Probe Requests
Stars: ✭ 167 (+568%)
Mutual labels:  wifi, wifi-security
Auto-Besside-Capturer
Capture WPA handshakes, using besside-ng. Auto upload to http://wpa-sec.stanev.org for cracking the password.
Stars: ✭ 28 (+12%)
Mutual labels:  wifi, wifi-security
Hcxdumptool
Small tool to capture packets from wlan devices.
Stars: ✭ 945 (+3680%)
Mutual labels:  wifi, wifi-security
feedingbottle
FeedingBottle is a Aircrack-ng GUI, create by Fast Light User-Interface Designer ("FLUID").
Stars: ✭ 26 (+4%)
Mutual labels:  wifi, wifi-security
wifi-pentesting-guide
WiFi Penetration Testing Guide
Stars: ✭ 105 (+320%)
Mutual labels:  wifi, wifi-security
Openwifi
open-source IEEE 802.11 WiFi baseband FPGA (chip) design
Stars: ✭ 2,257 (+8928%)
Mutual labels:  wifi, ieee80211
Scanr
Detect x86 shellcode in files and traffic.
Stars: ✭ 16 (-36%)
Mutual labels:  detection, ids
Bettercap
The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Stars: ✭ 10,735 (+42840%)
Mutual labels:  wifi, wifi-security
Whoishere.py
WIFI Client Detection - Identify people by assigning a name to a device performing a wireless probe request.
Stars: ✭ 182 (+628%)
Mutual labels:  wifi, wifi-security
Hcxtools
Portable (that doesn't include proprietary/commercial operating systems) solution for conversion of cap/pcap/pcapng (gz compressed) WiFi dump files to hashcat formats (recommended by hashcat) and to John the Ripper formats. hcx: h = hash, c = convert and calculate candidates, x = different hashtypes
Stars: ✭ 1,121 (+4384%)
Mutual labels:  wifi, wifi-security
Quantuminsert
Quantum Insert
Stars: ✭ 186 (+644%)
Mutual labels:  detection, ids
Boopsuite
A Suite of Tools written in Python for wireless auditing and security testing.
Stars: ✭ 807 (+3128%)
Mutual labels:  wifi, wifi-security
Catchme
CatchME - WiFi Fun Box "Having Fun with ESP8266"
Stars: ✭ 28 (+12%)
Mutual labels:  wifi, wifi-security
ApeX
Using Social Engineering To Obtain WiFi Passwords
Stars: ✭ 87 (+248%)
Mutual labels:  wifi, wifi-security
sledgehammer
🔨 📶 WiFi-Jammer/DoS toolset
Stars: ✭ 34 (+36%)
Mutual labels:  wifi, ieee80211

Easily Expandable Wireless Intrusion Detection System

Note: While this project may is in a state in which it can be used, it still needs a lot of development and thus is far away from being ready or perfect. However, feel free to play around and open issues if you see something interesting. Also have a look at the getting-started section before starting.

Background

Analyzing 0x90/wifi-arsenal especially in search of wireless intrusion detection systems (WIDS) I realized that there just is no complete ready-to-go solution yet, at least regarding free and open source software (FOSS). For me a WIDS should

  • detect most of the known Wi-Fi attacks,
  • scale easily and thus be able to work within big organizations and
  • be easily expandable.

Although there is indeed software on GitHub which can be used to detect Wi-Fi attacks, they are usually specialized on some attacks and/or they are hobby projects which would not fit in setups of bigger environments. Please have a look at the defence-related Wi-Fi tools on the wifi-arsenal list.

An exception should be mentioned: Kismet. It is probably the most famous and complete FOSS Wi-Fi solution and very popular. Still, it does not seem to fulfill the above necessities. And it is probably not the objective of Kismet to be a full-featured WIDS either. Instead it has also many options for pentesting Wi-Fi networks and other interesting stuff.

Main Idea of Eewids

Simple layout sketch of Eewids

Eewids uses standard software for distributing and analyzing data. The data captured by Eewids' capture tool is sent directly to a message broker. Actually, the Message Broker is the central point of Eewids. By using RabbitMQ -- one of the most popular systems of its kind -- it is easily possible to subscribe to a needed information on many different environments. This is supposed to be the big advantage for developers.

Let's look at a honey pot detection as an example. Instead of parsing packages and looking for e.g. Beacon frames and analyzing it afterwards, the detection method will just subscribe for all Beacon frames arriving at the Message Broker. It doesn't have to care about the capture process at all. The other frames are not of interest for this method anyway. The created service does not need to parse the Beacon frames, it just needs to access the json-formatted information it got from the Message Broker, e.g. data['wlan.SSID'] or data['wlan.BSSID']. This can be done independently of the programming language, as most of them are already able to interpret json and to access RabbitMQ. This should be indeed possible for every language which already has a client listed on RabbitMQ's website.

Another advantage is the freedom of choice of visualization/analyzing software. It is easily possible to include either influxdata's TICK stack or the ElasticSearch stack, both Open Source analyzing software which also have anomaly detection methods. These stacks and other software already have interfaces to access RabbitMQ and to read json-formatted data and thus it is easy to extract the collected information as needed. Eewids already integrates InfluxDB with Grafana for visualization of captured data.

This should make it easy to extend Eewids in various ways. Let's see what can happen.

TODOs

These are limitations and problems that would be nice to get addressed (beside a lot of others ;-) ):

  • pcapng-export tool -> export pcapng stream by getting all messages of the capture-raw exchange during a specific time frame and craft it to a pcapng
  • look for the tag_keys problem: telegraf is getting the data as json from rabbitmq and is sending this data to influxdb - we can only use these values in the 'where' part of a query in grafana that we have defined as 'tag_keys' in etc/telegraf.conf before hand. this is most annoying
  • Look if Kapacitor (Influx stack) could add any value to Eewids
  • Add RabbitMQ metric to Grafana https://www.rabbitmq.com/prometheus.html
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].