AtEar
AtEar Description
AtEar is a scalable and efficient system, and also the first web-based wireless vulnerability assessment solution.
This Wireless Vulnerability Analysis/Management Solution, AtEar, can be utilized both by businesses and in the home.
For business use, AtEar utilizes fingerprint devices for access to the network and to analyze the current wireless network conditions.
The automatic penetration testing function makes it possible to analyze wireless vulnerability conveniently and meticulously.
AtEar for home networks inspects network security conditions and monitors for any unregistered devices.
In short, AtEar is a wireless pentest system. AtEar provides a web-based user interface. AtEar is easy and fast to use.
AtEar Features
- Wireless Scanning(Ad-Hoc, Station, Access Point, Soft-Acess Point)
- Wireless Chart(Channel, Encryption, Type)
- Wireless Pentesting(WEP, WPA1, WPA2)
- Network Information Getting(IP, Connected Host Info)
- Fake AP
- Google Phishing Sites
- Facebook Phishing Sites
- Twitter Phishing Sites
- WIDS(Wireless intrusion detection system)
- Disassocation Flood
- Deauth Flood
- WESSID-NG Attack
- Koreck Chopchop attack
- Fragmentation PGRA Attack
- MDK MICHEAL SHUTDOWN Exploitation TKIP Attack
- Attack By TKIPUN-NG
- Authentication DOS Attack
- Assocation Flood
- High Amount of Assocation Sent
- Suspect Rouge AP
- Detected Beacon Flood
Network Pentesting
- FTP Brute Force
- SSH Brute Force
- Telnet Brute Force
- SMTP Brute Force
- POP Brute Force
- IMAP Brute Force
- LDAP Brute Force
- SMB Brute Force
- rlogin Brute Force
- MSSQL Brute Force
- MYSQL Brute Force
- PGSQL Brute Force
- VNC Brute Force
- SNMP Brute Force
Most recommended USB Lancards
- asus WL-167g v2
- Airlink AWLL3026
- Alfa AWUS036E
- Alfa AWUS036G
- Alfa AWUS036S
- Alfa AWUS050NH
- Alfa AWUS051NH
- Alfa AWUS052NH
- Digitus DN-7003GS
- D-Link DWL-G122 B1
- D-Link DWL-G122 C1
- D-Link WUA-1340
- Edimax EW-7318USg
- Hawking HWUG1
- Linksys WUSB54G v4
- Linksys WUSB54GC v1
- Linksys WUSB54GC v2
- Netgear WG111 v1
- Netgear WG111 v2
- Netgear WG111 v3
- Netgear WNDA3100 v1
- TP-Link TL-WN321G
- TP-Link TL-WN321G v4
- Trendnet TEW-429UB C1
- ZyXEL AG-225H
- ZyXEL G-202
Homepage: https://github.com/NORMA-Inc/AtEar
Author: NORMA-Inc
License: Apache-2.0
AtEar Help
usage:
run.py [-h] --iface IFACE
optional arguments:
-h, --help show this help message and exit --iface IFACE monitoring interface
AtEar Usage Example
Use the wlan0 interface to monitor and attack wireless networks:
cd ./AtEar/ sudo python run.py --iface wlan0
How to install AtEar
Installation on Kali Linux
git clone https://github.com/NORMA-Inc/AtEar.git cd ./AtEar/ sudo bash install.sh
AtEar Screenshots
AtEar Tutorials
- Operation Video Link
- USB Wi-Fi Adapters with monitor mode and wireless injection (100% compatible with Kali Linux) 2021
Related tools
- infernal-twin (66.9%)
- wifiphisher (65.6%)
- Wireless IDS [Intrusion Detection System] (63.4%)
- Fluxion (61.8%)
- Aircrack-ng (Tool) (59.8%)
- Besside-ng (RANDOM - 55.6%)
Comments are Closed