Skip to content

Wontfallo/Aether_wifi

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

22 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

🌐 Aether WiFi Analyzer

Modern WiFi Auditing & Analysis for Linux

A cross-platform, high-performance WiFi analyzer and auditing tool built with Tauri v2, React, and Rust.

Bringing the fluid UX of modern Android WiFi analyzers to the desktop, combined with the offensive capabilities of tools like ESP32 Marauder.

Tauri React Rust shadcn/ui


Aether Demo

Real-time WiFi spectrum analysis and network auditing in action


✨ Features

Aether is organized into a modular 10-page interface using the sleek shadcn/ui dark theme.

  • πŸ“Š Dashboard: Real-time network table showing BSSID, SSID, Channel, and RSSI with color-coded signal strength bars and sortable columns.
  • πŸ“‘ Spectrum Analyzer: Overlapping parabolic curves across 2.4 GHz, 5 GHz, and 6 GHz bands β€” visualizes channel congestion.
  • 🎯 Hunt Mode: Lock onto a target MAC address and track its RSSI over a rolling 60-second timeline. Walk around to triangulate signal origin.
  • πŸ” Audit Suite (Planned Consolidation): Dedicated tab for 1-Click Handshake Capture (Deauth β†’ EAPOL listener β†’ save .pcap).
  • ⚑ Attack Suite (Planned Consolidation): Advanced 802.11 injections inspired by ESP32 Marauder (Beacon spam, deauths, karma attacks).
  • πŸ•΅οΈ Recon: Host discovery, port scanning, and service enumeration.
  • πŸ‘οΈ Sniffer: Low-level packet monitoring for probe requests, deauths, PMKID collection, and more.
  • πŸ› οΈ Tools: Utility suite for MAC spoofing, SSID management, AP management, and wardriving capabilities.
  • 🩺 Environment Doctor: Auto-detects missing USB adapters, monitor mode status, and driver compatibility. Provides copy-paste remediation commands.
  • βš™οΈ Settings: List all network interfaces, toggle monitor/managed mode, view driver and PHY info.

πŸ—οΈ Architecture

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚  βš›οΈ  React Frontend (Aether-UI / shadcn/ui)                      β”‚
β”‚  β”œβ”€ πŸ“Š Dashboard      (network table, stats)                     β”‚
β”‚  β”œβ”€ πŸ“‘ Spectrum       (2.4/5/6 GHz channel viz)                  β”‚
β”‚  β”œβ”€ 🎯 Hunt Mode      (targeted RSSI tracker)                    β”‚
β”‚  β”œβ”€ πŸ” Audit            (WPA handshake capture)                  β”‚
β”‚  β”œβ”€ ⚑ Attack           (injection & flooding)                   β”‚
β”‚  β”œβ”€ πŸ•΅οΈ Recon           (network discovery)                        β”‚
β”‚  β”œβ”€ πŸ‘οΈ Sniffer         (raw packet monitor)                       β”‚
β”‚  β”œβ”€ πŸ› οΈ Tools           (MAC spoofing, utilities)                  β”‚
β”‚  β”œβ”€ 🩺 Env Doctor     (diagnostics)                              β”‚
β”‚  └─ βš™οΈ  Settings       (interface mode control)                   β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚  πŸ”— Tauri v2 IPC Bridge                                          β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚  πŸ¦€ Rust Backend (Aether-Core)                                   β”‚
β”‚  β”œβ”€ InterfaceScanner   (iw dev / ip link)                        β”‚
β”‚  β”œβ”€ ModeController     (managed ↔ monitor)                       β”‚
β”‚  β”œβ”€ PacketSniffer      (pcap + 802.11 parse)                     β”‚
β”‚  └─ AttackEngine       (frame injection)                         β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚  🐧 Linux Kernel (nl80211 / wireless stack)                      β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

πŸ“‹ Prerequisites

Requirement Installation
Node.js 18+ nodejs.org
Rust (stable) rustup.rs
Tauri v2 CLI cargo install tauri-cli
Dependencies sudo apt install libpcap-dev libwebkit2gtk-4.1-dev build-essential curl wget
Platform Native Kali Linux VM (VMware/VirtualBox) or Bare Metal.
USB WiFi Adapter Must support Monitor mode and packet injection (e.g., Alfa AWUS036ACH, TP-Link Archer T4U).

Note: Windows/WSL2 support has been entirely scrapped in favor of native Kali Linux VM setups due to persistent USB passthrough limitations and DKMS driver instability. Aether requires a native Linux environment.


πŸš€ Getting Started

# πŸ“¦ Clone and install frontend dependencies
git clone https://github.com/Wontfallo/Aether_wifi.git
cd Aether_wifi
npm install

# πŸ–₯️ Launch Aether
# The launcher automatically handles monitor mode setup and privilege elevation
npm run tauri dev

The Launcher (aether.sh)

Linux WiFi capture requires CAP_NET_RAW and CAP_NET_ADMIN to bind to interfaces in monitor mode. Aether uses a specialized launcher (aether.sh) to automatically:

  1. Stop interfering services (NetworkManager, wpa_supplicant).
  2. Put your selected interface into monitor mode using proper driver support.
  3. Launch the Tauri application with sudo while preserving necessary environment variables for Rust ($PATH, CARGO_HOME, RUSTUP_HOME).
  4. Restore services when closed.

🚧 Hardware & Driver Notes

  • Driver Compatibility: Ensure you are using the correct DKMS drivers for your specific chipset (e.g., realtek-rtl88xxau-dkms for RTL8812AU/RTL8814AU). Standard kernel drivers like rtw88_8814au can be temperamental with monitor mode packet injection.
  • Validation: If monitor mode works but no packets are captured, verify hardware viability with tcpdump -i wlan0 or by testing with standalone tools like Wifite.
  • Missing Interface: If the launcher fails to find an interface, ensure your USB adapter is physically connected and passed through to your Kali VM.

πŸ“– Developer Diary: Building Aether (April 2026)

This project serves as a living diary of our development journey.

The Great WSL2 Migration

We initially attempted to run Aether entirely within Windows Subsystem for Linux (WSL2) to provide a seamless Windows-native experience. We built a PowerShell script (scripts/attach_wsl_wifi.ps1) to leverage usbipd-win. However, deep dive diagnostics revealed that DKMS (Dynamic Kernel Module Support) failed to compile realtek-rtl8814au-dkms against the active WSL kernel (6.6.87.2-microsoft-standard-WSL2) due to missing build trees and undefined kernel symbols. Recompiling custom WSL2 kernels specifically for out-of-tree Wi-Fi injection drivers proved too fragile.

The Solution: We scrapped the entire "WSL nonsense" and migrated the project to a Native Kali Linux VM via VMware Workstation. By letting the hypervisor handle the USB pass-through, the native Kali DKMS packages now compile perfectly against a standard kernel, giving us a fully functioning, monitor-mode capable wlan0 interface.

The Monitor Mode & CAP_NET_RAW Struggles

Even after moving to the VM, we hit immediate blockers with wlan0 packet captures. Specifically, Tauri threw CAPTURE_ERROR: Failed to activate capture on 'wlan0': libpcap error: Attempt to create packet socket failed - CAP_NET_RAW may be required.

  • The Culprit: Rust applications launched via Tauri need elevated privileges to bind raw packet sockets (libpcap). We updated the aether.sh launcher to wrap cargo tauri dev with sudo -E to ensure the Rust backend inherits the necessary capabilities while maintaining the user's $PATH for Node and Cargo.
  • RF Weirdness & Driver Quirks: Even in monitor mode, airmon-ng and initial scans yielded nothing, despite seeing APs perfectly fine in managed mode. This led to us utilizing tools like Wifite standalone to validate that the hardware actually worked, while dealing with extreme 2.4GHz RF interference in the environment (a bizarre 55dBm hump on channel 11 blowing out adjacent channels).

UI Overhaul: The shadcn/ui Migration

The user rightly pointed out: "please dont build your own ui components when you could just use know great lookkng libraries right?" We entirely scrapped our custom CSS and Aether-specific utility classes, transitioning to a pure shadcn/ui dark theme.

  • Components Installed: Over 14 core components (Button, Card, Badge, Table, Tabs, Dialog, Input, Select, Switch, etc.) were deeply integrated.
  • Page Expansion: We scaffolded 4 entirely new pages (/recon, /attack, /sniffer, /tools) to expand our offensive posture, building out the sidebar to 10 distinct navigation items.
  • The Result: The app immediately felt more robust, responsive, and maintainable. We flirted with migrating to Material-UI (MUI) momentarily but committed to the sleek, modern aesthetic shadcn/ui provided.

The Offensive Paradigm Shift: Marauder & Bettercap Inspiration

During debugging, we used tools like Wifite and Bettercap to manually test our hardware. While Aether does not run these tools under the hood, we recognized their power and elegance.

  • The Goal: We are modeling Aether's native offensive capabilities after the excellent ESP32 Marauder (Beacon spam, deauths, karma attacks) and Bettercap workflows.
  • Rather than reinventing the wheel blindly, we aim to build our own high-speed Rust orchestrator that matches the capabilities of these proven tools.

Next Steps: The Great Consolidation

Our immediate next objective is merging the scattered offensive tabs (Audit.tsx, Attack.tsx) into a single, cohesive Offensive Suite. This unified interface will house 1-click captures, targeted deauths, and advanced injections in one intuitive dashboard.


πŸ“ Project Structure

Aether_wifi/
β”œβ”€β”€ πŸ“‚ src/                          # βš›οΈ React Frontend
β”‚   β”œβ”€β”€ πŸ“‚ components/
β”‚   β”‚   β”œβ”€β”€ πŸ“‚ layout/               # AppShell, Sidebar
β”‚   β”‚   └── πŸ“‚ ui/                   # shadcn/ui components (Radix primitives + Tailwind)
β”‚   β”œβ”€β”€ πŸ“‚ hooks/
β”‚   β”‚   └── πŸ“„ useBeaconCapture.tsx  # Shared state for captured data
β”‚   β”œβ”€β”€ πŸ“‚ pages/
β”‚   β”‚   β”œβ”€β”€ πŸ“„ Dashboard.tsx         # Network scan table
β”‚   β”‚   β”œβ”€β”€ πŸ“„ Spectrum.tsx          # Channel spectrum analyzer
β”‚   β”‚   β”œβ”€β”€ πŸ“„ Hunt.tsx              # RSSI target tracker
β”‚   β”‚   β”œβ”€β”€ πŸ“„ Audit.tsx             # [PLANNED MERGE] WPA Handshake capture
β”‚   β”‚   β”œβ”€β”€ πŸ“„ Attack.tsx            # [PLANNED MERGE] Beacon spam, injection attacks
β”‚   β”‚   β”œβ”€β”€ πŸ“„ Recon.tsx             # Network discovery & port scanning
β”‚   β”‚   β”œβ”€β”€ πŸ“„ Sniffer.tsx           # Low-level packet monitor
β”‚   β”‚   β”œβ”€β”€ πŸ“„ Tools.tsx             # Utility suite
β”‚   β”‚   β”œβ”€β”€ πŸ“„ EnvironmentDoctor.tsx # System diagnostics
β”‚   β”‚   └── πŸ“„ Settings.tsx          # Interface management
β”‚   β”œβ”€β”€ πŸ“„ App.tsx                   # React Router
β”‚   └── πŸ“„ index.css                 # Global styles (shadcn/ui dark theme)
β”œβ”€β”€ πŸ“‚ src-tauri/                    # πŸ¦€ Rust Backend
β”‚   β”œβ”€β”€ πŸ“‚ src/
β”‚   β”‚   β”œβ”€β”€ πŸ“‚ commands/             # Tauri IPC endpoints
β”‚   β”‚   β”œβ”€β”€ πŸ“‚ network/              # Core Logic (Sniffing, Attacks, Scans)
β”‚   β”‚   β”œβ”€β”€ πŸ“„ error.rs              # Custom error handling
β”‚   β”‚   └── πŸ“„ main.rs               # Entry point
β”‚   β”œβ”€β”€ πŸ“„ Cargo.toml
β”‚   └── πŸ“„ tauri.conf.json
β”œβ”€β”€ πŸ“„ aether.sh                     # Linux Privileged Launcher (sudo wrapper)
└── πŸ“„ package.json                  # Entry scripts

⚠️ Security Notice

Warning

This tool contains offensive security capabilities (deauthentication attacks, packet injection, evil portals).

Use only on networks you own or have explicit written authorization to test.

Unauthorized use may violate federal and local laws. The authors assume no liability for misuse of this software.


πŸ“œ License

This project is licensed under the MIT License - see the LICENSE file for details.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors