Hijacker v1-stable version - Android GUI Application for wifi auditing tools.

Hijacker v1-stable version – Android GUI Application for wifi auditing tools.

Changelog From Hijackerv-1-RC to  Hijacker v1-stable version 22/1/2017:
* Add the option to mark Access Points or Stations to distinguish them easily, move options restore commands in onResume() of Fragments, change fifo to LinkedList to avoid a bug that still happens, use marked devices for ‘smart’ selection in MDKFragment, ReaverFragment and CustomActionFragment, create separate popup for attacks on Access Points, clear ‘marked’ lists on reset
* Fix duplicate watchdog thread running, remove reset() call in shell.done(), handle simultaneous calls to getFreeShell(), improve CustomAction saving
* Bug fixes, code optimization, cleanup, use Snackbar instead of Toast in Dialogs, stop only airodump with ‘stop’ button, add notification for ‘wpa handshake captured’, add SuperSU check, add ‘install in system’ warning

hijacker v1-stable

Hijacker is a Graphical User Interface for the wireless auditing tools airodump-ng, aireplay-ng and mdk3. It offers a simple and easy UI to use these tools without typing commands in a console and copy&pasting MAC addresses.
This application requires an android device with a wireless adapter that supports Monitor Mode. A few android devices do, but none of them natively. This means that you will need a custom firmware. Nexus 5 and any other device that uses the BCM4339 (and BCM4358 (although injection is not yet supported so no aireplay or mdk)) chipset will work with Nexmon. Also, devices that use BCM4330 can use bcmon. An alternative would be to use an external adapter that supports monitor mode in Android with an OTG cable.

The required tools are included in the app. To install them go to Settings and click “Install Tools”. This will install everything in the directory you select. If you have already installed them, you don’t have to do anything. You can also have them at any directory you want and set the directories in Settings, though this might cause the wireless tools not being found by the aircrack-ng suite. The Nexmon driver and management utility is also included.
Root is also necessary, as these tools need root to work. If you don’t grant root permissions to it, it hangs… for some reason… don’t know why…

Aircrack, Airodump, Aireplay, MDK3 and Reaver GUI Application for Android

* View a list of access points and stations (clients) around you (even hidden ones)
* View the activity of a network (by measuring beacons and data packets) and its clients
* Deauthenticate all the clients of a network
* Deauthenticate a specific client from the network it’s connected
* MDK3 Beacon Flooding with custom SSID list
* MDK3 Authentication DoS for a specific network or to everyone
* Try to get a WPA handshake or gather IVs to crack a WEP network
* Statistics about access points (only encryption for now)
* See the manufacturer of a device (AP or station) from a OUI database (pulled from IEEE)
* See the signal power of devices and filter the ones that are closer to you
* Leave the app running in the background, optionally with a notification
* Copy commands or MAC addresses to clipboard, so you can run them in a terminal if something goes wrong
* Include the tools
* Reaver WPS cracking (pixie-dust attack using NetHunter chroot and external adapter)
* .cap files cracking with custom wordlist
* Save captured packets in .cap file
* Create custom commands to be ran on an access point or a client with one click

Make sure:
– you are on Android 5+
– you are rooted. SuperSU is required. If you are on CM, install SuperSU
– have installed busybox (opened and installed the tools)
– have a firmware to support Monitor Mode on your wireless interface

APK Download: Hijacker-release-v1.4-stable.3.apk(6.16 MB)
Source: https://github.com/chrisk44 | Our Post Before