INTRODUCTION
Welcome to AUTOSPECT: Automatic Wifi Inspector.
AUTOSPECT is a powerful, purpose-built platform engineered for comprehensive security auditing and forensic analysis of wireless networks. By bridging the gap between complex terminal-based pentesting tools and a streamlined user experience, AUTOSPECT allows both professionals and students to execute high-level security assessments with unprecedented ease.
Seamless Web-Based Auditing
The core of AUTOSPECT is its intuitive web interface. Unlike traditional security distributions that require extensive command-line knowledge, AUTOSPECT enables you to scan, analyze, and inspect Wi-Fi infrastructures exclusively through your browser. From capturing handshakes to retrieving the WiFi password (wordlists), every stage of the auditing process is managed via a sleek, responsive dashboard. You can perform deep-dive inspections and manage captured data without ever having to touch the CLI (Command Line Interface).
Built on a Rock-Solid Foundation
AUTOSPECT leverages a highly optimized Debian 13 OS foundation, delivering a pre-configured and robust environment specifically tuned for wireless performance. The system is engineered for efficiency and precision, providing:
- Automated Packet Capture: Effortlessly gather traffic data from surrounding networks.
- In-Depth Handshake Analysis: Securely manage and analyze WPA/WPA2 handshakes.
- Recovering Passwords: Automatically retrieve the WiFi passwords by comparing the captured handshakes with extensive wordlists.
Designed to empower users to uncover critical insights within complex Wi-Fi infrastructures, AUTOSPECT simplifies the technical overhead so you can focus on the results.
DOWNLOAD
Download the latest stable release of the Autospect ISO below. This file contains the complete, bootable operating system.
DOWNLOAD AUTOSPECT ISOCHECKSUM
To ensure the integrity and authenticity of your downloaded Autospect ISO, please verify it using the SHA256 cryptographic hash provided below.
File: autospect.iso
Checksum Verification:
To verify your downloaded ISO:
- Linux: Open terminal:
sha256sum autospect.iso - macOS: Open terminal:
shasum -a 256 autospect.iso - Windows (PowerShell): Open PowerShell:
Get-FileHash .\autospect.iso -Algorithm SHA256
The resulting hash must match the one provided on this website.
Deployment Guide & Operation Manual
This section provides a quick-start guide for deploying and operating AUTOSPECT.
Getting Started:
- Prepare USB: Flash the downloaded
autospect.isofile to a USB drive (8GB or larger recommended) using reliable tools like Rufus (Windows) or BalenaEtcher (Windows, macOS, Linux). - Boot from USB: Insert the prepared USB drive into your target machine. During startup, press the designated key (commonly F12, F2, F10, or DEL, depending on the BIOS/UEFI) to access the boot menu and select your USB drive.
- Launch Environment: From the Autospect boot menu, select "Live Boot" to start the operating system without installation, or choose the option to install Autospect on your system's harddrive.
Initial Operation:
Once the desktop environment loads, open a webbrowser and navigate to the [AUTOSPECT_IP_OR_HOSTNAME] : [8443]
https://autospect.labs.kammie.nl:8443
Start by selecting your physical network interface name form the dropdown menu. Then click the START button to switch the wireless network interface into monitoring mode. Please be advised that your NIC must be compatible with Linux, all drivers need to be installed and the NIC must be capable of packet injection. Autospect comes with many wireless NIC drivers preinstalled.
Options:
- START: Switches the physical NIC from AP mode to Monitor mode.
- STOP: Switches the NIC from Monitor mode to AP mode.
- SCAN: Scans the environment for available wireless networks for 10 seconds. The result is displayed in the network table.
- CLIENT SCAN: Scans the selected SSID and BSSID for connected client devices.
- SAVE: Saves the selected wireless network details to a json file.
- DEAUTH BROADCAST: Sends an n-number of deauthentication packets to the access point for an x-period of time (selectable) as a broadcast (FF:FF:FF:FF:FF:FF) to deauthenticate ALL client devices from the access point.
- CLIENT ATTACK: Sends an n-number of deauthentication packets to the selected client for an x-period of time (selectable) to deauthenticate the specific client device from the access point.
- ATTACK: Same as a DEAUTHENTICATION BROADCAST, set globally as an attack vector.
In the ATTACK and/or DEAUTH BROADCAST popup, first start the listener. Then start the attack. Be advised that for optimal results the attack must last for at least 15 seconds. If the handshake is not captured in time, restart the listener and then restart the attack. If the handshake is succesfully captured, you will be presented with the option to select a wordlist in order to try to retrieve the password.
The small version of rockyou.txt is already included. You can also upload your own wordlists. Please be advised that uploading wordlists is subject to the nginx php max_file_size and max_upload_size parameters. You can either increase these parameters or you can transfer your wordlists with ssh to the /var/www/aircrack-data/wordlists folder (recommended). You may also choose to save the captured handshake .pcap file for further analysis in another tool or pentesting distro.
Visual Interface Overview
Explore key operational previews of the Autospect environment and its integrated modules.
Custom Boot Menu with V1.01 Splash
Optimized Desktop Environment
Real-time Wifi Inspection Module
Vulnerability Reporting Console
Advanced Network Packet Analysis
Interactive Terminal with Autospect