Airstrike Features
Platform Overview
Airstrike is a Flask + Socket.IO web interface that orchestrates Wi-Fi assessment tooling directly from your browser. It keeps the UI simple, the API stable, and the code paths lean so you can focus on running proven wireless attacks without juggling dozens of terminals.
Focused Attack Surface
This build intentionally spotlights the three most stable operations in the suite:
- Deauthentication — automatically floods crafted 802.11 deauth frames to boot clients off a chosen AP.
- Handshake Capture + Cracking — captures WPA/WPA2 handshakes and launches aircrack-ng with the wordlist defined in
web/shared.py. - Evil Twin — clones the SSID with hostapd/dnsmasq, stands up DHCP/DNS spoofing, and can front a captive portal.
Everything else—experimental stubs, half-finished modules—was intentionally removed to keep operators on a predictable, regression-tested workflow.
Browser-driven Workflow
After launching sudo python run.py, browse to http://airstrike.local:5000:
- Scan tab discovers nearby networks and shows adapter state.
- Attack tab exposes configuration panels for the active scenario.
- Results streams real-time Socket.IO logs and stores captures under
captures/<BSSID>.
Ops-ready Defaults
- Global config lives in
web/shared.py(interface, wordlist, capture directory). run.pyenforces sudo/root, ensures/etc/hostscontainsairstrike.local, and starts the Socket.IO server.- Missing binaries (aircrack-ng, hostapd, dnsmasq, iw, etc.) surface immediately in the UI log pane so you can install them and retry.
- Adapters must support monitor mode and injection—USB NICs with Atheros/Ralink chipsets are field-tested favorites.
Repository Layout
attacks/— worker modules for deauth, handshake capture/cracking, and Evil Twin orchestration.web/— Flask blueprints, Socket.IO events, and front-end modules underweb/static/js/modules/attacks/.utils/— helpers for interface management (monitor/managed mode toggles).run.py— entry point that enforces root execution and bootstraps the environment.
Lab-first Disclaimer
Airstrike is intended for lab use, red-team exercises, and research on networks you own or are explicitly authorized to assess. Misuse may violate law or policy—operate responsibly and document authorization for every engagement.