Are you ready to dive into the fascinating world of WiFi exploration and security? Meet AngryOxide, your trusty sidekick for unravelling the secrets of wireless networks. Whether you’re a curious beginner or a seasoned network sleuth, AngryOxide has something in store for you.
Choose the appropriate release for your system (Linux x86_64 in most cases):
Download the pre-compiled binary.
Example:
angryoxide-linux-x86_64.tar.gz
ShellSession
Extract and Install:
Open your terminal and navigate to the directory where you downloaded the binary.
Untar the downloaded file:
tar -xf angryoxide-linux-x86_64.tar.gz
ShellSession
Make the installation script executable:
chmod +x install
ShellSession
Install AngryOxide (as root, including zsh/bash completions):
sudo ./install
ShellSession
1.2. Verify Installation
Verify AngryOxide Installation:
To verify that AngryOxide is installed correctly, run the following command:
angryoxide --version
ShellSession
You should see the version information displayed: AngryOxide 0.8.13
Requirements and Usage
Before diving into using AngryOxide, it’s essential to ensure that you have the right hardware setup for optimal performance. AngryOxide is a powerful tool for WiFi penetration testing and requires compatible WiFi hardware to function effectively. The software works best with WiFi adapters that support monitor mode and packet injection.
One of the most recommended WiFi adapters is the Alfa AWUS036NHA, which uses the Atheros AR9271 chipset. This adapter is known for its excellent compatibility with various penetration testing tools due to its robust support for monitor mode and packet injection. Additionally, the TP-Link TL-WN722N (version 1) is another popular choice, also leveraging the Atheros AR9271 chipset.
For broader compatibility, consider adapters with the Realtek RTL8812AU chipset, like the Alfa AWUS036ACH. These adapters are recognized for their dual-band support (2.4GHz and 5GHz), providing flexibility for different network environments. Ensuring you have the correct WiFi hardware will help you make the most out of AngryOxide’s capabilities and streamline your penetration testing processes.
Note
I will be using my trusty yellowing TP-Link TL-WN722N, which spent a week outside in the wet weather when it fell out of my pocket. After finding it again, I dried it out and cleaned the rust from the USB connector, and it worked as it always did. It’s a hardy adapter!
2.1. Basic Usage With Examples
Basic Command Syntax:
Below is an example of how to format an AngryOxide command.
Example:
angryoxide [OPTIONS] --interface <INTERFACE>
ShellSession
Finding Your Desired Interface:
To find out the interface name of your wi-fi adapter we can use iwconfig. First use iwconfig without your adapter plugged into a USB port. This only shows wlp58s0 which will be my laptops internal wireless connection
Example:
stoke@Linux:~$ iwconfiglo no wireless extensions.wlp58s0 IEEE 802.11 ESSID:"MyHomeNetwork" Mode:Managed Frequency:2.427 GHz Access Point: 02:1A:3F:8C:7B:ED Bit Rate=115.6 Mb/s Tx-Power=22 dBm Retry short limit:7 RTS thr:off Fragment thr:off Power Management:on Link Quality=58/70 Signal level=-52 dBm Rx invalid nwid:0 Rx invalid crypt:0 Rx invalid frag:0 Tx excessive retries:3 Invalid misc:21213 Missed beacon:0
ShellSession
Now plug your wi-fi adapter into a USB port and use the iwconfig command again and the new entry is the interface we will be using.
stoke@Linux-Elite:~$ iwconfiglo no wireless extensions.wlp58s0 IEEE 802.11 ESSID:"MyHomeNetwork" Mode:Managed Frequency:2.427 GHz Access Point: 02:1A:3F:8C:7B:ED Bit Rate=86.7 Mb/s Tx-Power=22 dBm Retry short limit:7 RTS thr:off Fragment thr:off Power Management:on Link Quality=56/70 Signal level=-54 dBm Rx invalid nwid:0 Rx invalid crypt:0 Rx invalid frag:0 Tx excessive retries:3 Invalid misc:21217 Missed beacon:0wlx30b5c2198971 IEEE 802.11 ESSID:off/any Mode:Managed Access Point: Not-Associated Tx-Power=20 dBm Retry short limit:7 RTS thr:off Fragment thr:off Power Management:off
ShellSession
So now we can see the interface we will be using is named: wlx30b5c2198971
Whitelist Protection:
Protect specific networks from attacks by adding them to the whitelist.
Now we can start linking all the commands together. In this example I want to use my targetlist as well as my whitelist and scan the 2.4GHz frequency band on channels 1 and 6, while saving the output files to a specific directory:
AngryOxide combines WiFi exploration, automated attacks, and hashline generation—all in one powerful tool. Remember to use it responsibly and ethically. Obtain proper authorisation before testing on any network 😉.
Happy hacking, and may your WiFi adventures be both educational and secure! 🌐🔍
Disclaimer
AngryOxide is for educational and research purposes only. Use it responsibly and legally. I am not responsible for any misuse or damage caused by its usage. Always obtain proper authorisation before testing on any network.