AngryOxide Newbie Guide: Setup, Requirements, and Getting Started

Introduction

Are you ready to dive into the fascinating world of WiFi exploration and security? Meet AngryOxide, your trusty sidekick for unravelling the secrets of wireless networks. Whether you’re a curious beginner or a seasoned network sleuth, AngryOxide has something in store for you.

Installation Steps

1.1. Download Pre-Compiled Binaries

Download the Release:

Choose the appropriate release for your system (Linux x86_64 in most cases):

Download the pre-compiled binary.

Example:

angryoxide-linux-x86_64.tar.gz
ShellSession

Extract and Install:

Open your terminal and navigate to the directory where you downloaded the binary.

Untar the downloaded file:

tar -xf angryoxide-linux-x86_64.tar.gz
ShellSession

Make the installation script executable:

chmod +x install
ShellSession

Install AngryOxide (as root, including zsh/bash completions):

sudo ./install
ShellSession

1.2. Verify Installation

Verify AngryOxide Installation:

To verify that AngryOxide is installed correctly, run the following command:

angryoxide --version
ShellSession

You should see the version information displayed: AngryOxide 0.8.13

Requirements and Usage

Before diving into using AngryOxide, it’s essential to ensure that you have the right hardware setup for optimal performance. AngryOxide is a powerful tool for WiFi penetration testing and requires compatible WiFi hardware to function effectively. The software works best with WiFi adapters that support monitor mode and packet injection.

One of the most recommended WiFi adapters is the Alfa AWUS036NHA, which uses the Atheros AR9271 chipset. This adapter is known for its excellent compatibility with various penetration testing tools due to its robust support for monitor mode and packet injection. Additionally, the TP-Link TL-WN722N (version 1) is another popular choice, also leveraging the Atheros AR9271 chipset.

For broader compatibility, consider adapters with the Realtek RTL8812AU chipset, like the Alfa AWUS036ACH. These adapters are recognized for their dual-band support (2.4GHz and 5GHz), providing flexibility for different network environments. Ensuring you have the correct WiFi hardware will help you make the most out of AngryOxide’s capabilities and streamline your penetration testing processes.

Note

I will be using my trusty yellowing TP-Link TL-WN722N, which spent a week outside in the wet weather when it fell out of my pocket. After finding it again, I dried it out and cleaned the rust from the USB connector, and it worked as it always did. It’s a hardy adapter!

2.1. Basic Usage With Examples

Basic Command Syntax:

Below is an example of how to format an AngryOxide command.

Example:

angryoxide [OPTIONS] --interface <INTERFACE>
ShellSession

Finding Your Desired Interface:

To find out the interface name of your wi-fi adapter we can use iwconfig. First use iwconfig without your adapter plugged into a USB port. This only shows wlp58s0 which will be my laptops internal wireless connection

Example:

stoke@Linux:~$ iwconfig
lo        no wireless extensions.

wlp58s0   IEEE 802.11  ESSID:"MyHomeNetwork"  
          Mode:Managed  Frequency:2.427 GHz  Access Point: 02:1A:3F:8C:7B:ED   
          Bit Rate=115.6 Mb/s   Tx-Power=22 dBm   
          Retry short limit:7   RTS thr:off   Fragment thr:off
          Power Management:on
          Link Quality=58/70  Signal level=-52 dBm  
          Rx invalid nwid:0  Rx invalid crypt:0  Rx invalid frag:0
          Tx excessive retries:3  Invalid misc:21213   Missed beacon:0
ShellSession

Now plug your wi-fi adapter into a USB port and use the iwconfig command again and the new entry is the interface we will be using.

stoke@Linux-Elite:~$ iwconfig
lo        no wireless extensions.

wlp58s0   IEEE 802.11  ESSID:"MyHomeNetwork"  
          Mode:Managed  Frequency:2.427 GHz  Access Point: 02:1A:3F:8C:7B:ED   
          Bit Rate=86.7 Mb/s   Tx-Power=22 dBm   
          Retry short limit:7   RTS thr:off   Fragment thr:off
          Power Management:on
          Link Quality=56/70  Signal level=-54 dBm  
          Rx invalid nwid:0  Rx invalid crypt:0  Rx invalid frag:0
          Tx excessive retries:3  Invalid misc:21217   Missed beacon:0

wlx30b5c2198971  IEEE 802.11  ESSID:off/any  
          Mode:Managed  Access Point: Not-Associated   Tx-Power=20 dBm   
          Retry short limit:7   RTS thr:off   Fragment thr:off
          Power Management:off
ShellSession

So now we can see the interface we will be using is named: wlx30b5c2198971

Whitelist Protection:

Protect specific networks from attacks by adding them to the whitelist.

Example:

sudo angryoxide --whitelist-entry MyHomeNetwork --interface wlx30b5c2198971
ShellSession

This can also be formatted more concisely with:

Example:

sudo angryoxide -w MyHomeNetwork -i wlx30b5c2198971
ShellSession

…and if you want to add more than one network to the whitelist then each network needs its own entry:

Example:

sudo angryoxide -w MyHomeNetwork -w MyHotspot -w PriorCrackedNetwork -i wlx30b5c2198971
ShellSession

Using A Whitelist File:

To easily add networks to a whitelist file we use.

Example:

sudo angryoxide --whitelist /directory/location/whitelist.txt -i wlx30b5c2198971
ShellSession

Example whitelist.txt file:

MyHomeNetwork
MyHotspot
PriorCrackedNetwork
whitelist.txt

Targeting A Network:

To target a specific network we use the command:

Example:

sudo angryoxide --target-entry AttackMeNetwork --interface wlx30b5c2198971
ShellSession

This can also be formatted more concisely with:

Example:

sudo angryoxide -t AttackMeNetwork -i wlx30b5c2198971
ShellSession

Target more than one network with:

Example:

sudo angryoxide -t AttackMeNetwork -t AttackMeNow -t Begging4it -i wlx30b5c2198971
ShellSession

Using A Targetlist File:

To easily add networks to a targetlist file we use.

Example:

sudo angryoxide --targetlist /directory/location/targetlist.txt -i wlx30b5c2198971
ShellSession

Example targetlist.txt file:

AttackMeNetwork
AttackMeNow
Begging4it
targetlist.txt

Saving To An Output File:

To save the AngryOxide output files to a specific location we use.

Example:

sudo angryoxide --output /directory/location/handshake-files/SKY49D0A -i wlx30b5c2198971
ShellSession

Example output files:

2.2. Linking It All Together With Examples

Frequency Band And Channel:

The channel and band can also be specified. So to scan 2.4GHz frequency band on channel 1 we can use:

Example:

sudo angryoxide --channel 1 --band 2 --interface wlx30b5c2198971
ShellSession

This can also be formatted more concisely with:

Example:

sudo angryoxide -c 1 -b 2 -i wlx30b5c2198971
ShellSession

Linking Commands:

Now we can start linking all the commands together. In this example I want to use my targetlist as well as my whitelist and scan the 2.4GHz frequency band on channels 1 and 6, while saving the output files to a specific directory:

Example:

sudo angryoxide --whitelist /AngryOxide/Stoke/whitelist.txt --targetlist /AngryOxide/Stoke/targetlist.txt -b 2 -c 1,6 -o /AngryOxide/Stoke/MyCapFiles/ -i wlx30b5c2198971
ShellSession

Conclusion

AngryOxide combines WiFi exploration, automated attacks, and hashline generation—all in one powerful tool. Remember to use it responsibly and ethically. Obtain proper authorisation before testing on any network 😉.

Happy hacking, and may your WiFi adventures be both educational and secure! 🌐🔍

Disclaimer

AngryOxide is for educational and research purposes only. Use it responsibly and legally. I am not responsible for any misuse or damage caused by its usage. Always obtain proper authorisation before testing on any network.

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.