Skip to content

modules wifi

Lucas Fernandez edited this page Nov 4, 2019 · 1 revision

In this category you can find all the modules related to WIFI, which will deal with various topics, such as sniffing or deauthentication. To load a module from this category load wifi/module.

Required Total modules
Network card that works in promiscuous mode 8

The modules are listed below with their description and options to configure.

access-points

This module allows us to see the access points using 'access_points' library. No configuration required.

Option Required Description
- - -

access-points-nmcli

This module allows us to see the access points using nmcli, the command used is: nmcli dev wifi list. No configuration required.

Option Required Description
- - -

access-points-sniffing

With this module you can discover nearby access points by sniffing.

Option Required Description
channel False Network channel. Configure this option if you want to fix it and not 'make jumps'
iface True Network Interface (that allows promiscuous mode)

airprint

This module will connect to a CUPS server and for each printer configured and marked as shared will generate a .service file for avahi that is compatible with Apple's AirPrint announcements.

Option Required Description
admin False Include the printer specified uri as the adminurl
dir False Directory to create service files
prefix False Prefix all files with this string
rhost False Remote host IP
rport False Remote port (Example: 80)
user False Username to authenticate with against CUPS
verbose False Show extra info while running module

deauth

With this module you will be able to pull a specific user out from a specific network. If client is set to broadcast you will kick out all users. If count -1 the attack will be continued until you finish it manually.

Option Required Description
bssid True Access point mac address
client False Target Mac address
count False Number of packets to send (-1 >> infinite in background)
iface False Network interface

search-printers

Launch this module to discover nearby printers that have a raised access point.

Option Required Description
channel False Network channel. Configure this option if you want to fix it and not 'make jumps'
iface True Network Interface (that allows promiscuous mode)

setup-access_point

This module will be in charge of raising an access point configured with the different options. Allows you to start Wireshark and Tshark to capture traffic automatically.

Option Required Description
ap_iface True The name of your wireless interface (for the AP)
channel True Network Channel to the AP
dnsspoof False Spoof DNS?
driftnet False Capture unencrypted images with DRIFTNET?
hostapd_wpa False Enable WPA2 encryption?
net_iface False The name of your internet connected interface
ssid True AP SSID to show
sslstrip False Use SSLSTRIP 2.0?
tshark False Capture packets to .pcap with TSHARK? (no gui needed)
wireshark False Start Wireshark?
wpa_passphrase False Please enter the WPA2 passphrase for the AP ('minimum 8 characters')
proxy False Capture traffic? (only works with no sslstrip)

stations-sniffing

With this module you can discover stations connected to access points by sniffing. It allows you search for specific venedores devices.

Option Required Description
channel False Network channel. Configure this option if you want to fix it and not 'make jumps'
iface True Network Interface (that allows promiscuous mode)
vendor False Configure filter vendor
Clone this wiki locally