# Airgeddon

## <mark style="color:blue;">Overview</mark>

Airgeddon is an open-source, cross-platform tool designed to help pentesters and security researchers with wireless attacks. It provides a comprehensive suite of tools for scanning, attacking, and exploiting wireless networks.

Airgeddon is a powerful tool that can be used to perform a variety of wireless attacks, including:

* **Evil twin attacks:** Airgeddon can be used to create fake Wi-Fi networks that look identical to legitimate ones. When a victim connects to the fake network, the attacker can intercept their traffic and steal their data.
* **Deauthentication attacks:** Airgeddon can be used to deauthenticate victims from legitimate Wi-Fi networks. This forces the victims to reconnect to the network, which gives the attacker an opportunity to intercept their traffic.
* **Beacon hijacking attacks:** Airgeddon can be used to hijack the beacons of legitimate Wi-Fi networks. This allows the attacker to send fake beacons to victims, which can trick them into connecting to the attacker's network.
* **Probe request injection attacks:** Airgeddon can be used to inject fake probe requests into the air. This can trick legitimate Wi-Fi networks into responding to the fake probe requests, which can reveal information about the networks.

Airgeddon also includes a variety of tools for scanning and exploiting wireless networks, such as:

* **Wi-Fi scanners:** Airgeddon includes a variety of Wi-Fi scanners that can be used to identify wireless networks in the area.
* **Wireless intrusion detection systems (WIDS):** Airgeddon includes a WIDS that can be used to detect common wireless attacks.
* **Wireless exploitation tools:** Airgeddon includes a variety of wireless exploitation tools that can be used to exploit vulnerabilities in wireless networks.

Airgeddon is a powerful tool that can be used to perform a variety of wireless attacks. It is important to note that Airgeddon should only be used for educational purposes or with the permission of the network owner.

Here are some of the advantages of using Airgeddon:

* **Open source:** Airgeddon is an open-source tool, which means that it is free to use and modify.
* **Cross-platform:** Airgeddon is a cross-platform tool, which means that it can be used on Windows, Linux, and macOS.
* **Comprehensive:** Airgeddon provides a comprehensive suite of tools for scanning, attacking, and exploiting wireless networks.
* **Powerful:** Airgeddon is a powerful tool that can be used to perform a variety of wireless attacks.

If you are interested in learning more about wireless security, Airgeddon is a great tool to start with. It is a powerful and comprehensive tool that can help you to learn about the different types of wireless attacks and how to defend against them.

{% embed url="<https://www.kali.org/tools/airgeddon/>" %}

{% embed url="<https://github.com/v1s1t0r1sh3r3/airgeddon>" %}

## <mark style="color:blue;">How to use it ?</mark>

You can check those YouTube Videos/Tutorials about Airgeddon

* [This YouTube Video](https://www.youtube.com/watch?v=SY0WMHTCCOM) created by [Null Byte](https://www.youtube.com/@NullByteWHT)

{% embed url="<https://null-byte.wonderhowto.com/how-to/hack-wpa-wpa2-wi-fi-passwords-with-pixie-dust-attack-using-airgeddon-0183556/>" %}

* [This YouTube Video](https://www.youtube.com/watch?v=ejTPWPGP0GA) created by [Null Byte](https://www.youtube.com/@NullByteWHT)

{% embed url="<https://null-byte.wonderhowto.com/how-to/video-crack-weak-wi-fi-passwords-seconds-with-airgeddon-parrot-os-0181434/>" %}

* [This YouTube Video](https://www.youtube.com/watch?v=nHaJUjhfjjI) created by [SecurityFWD](https://www.youtube.com/@SecurityFWD)&#x20;
* [This YouTube Video](https://www.youtube.com/watch?v=q8hOyqYCYtI) created by [Cyber Av3s](https://www.youtube.com/@cyberav3s)
* [This YouTube Video](https://www.youtube.com/watch?v=LXcSJJc1hms) (MITM Attack) created by [Liron Segev](https://www.youtube.com/@LironSegev)


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://hackingforbabies.gitbook.io/en/wifi-cracking/airgeddon.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
