-
Notifications
You must be signed in to change notification settings - Fork 134
modules wifi
In this category you can find all the modules related to WIFI, which will deal with various topics, such as sniffing or deauthentication. To load a module from this category load wifi/module.
Required | Total modules |
---|---|
Network card that works in promiscuous mode | 8 |
The modules are listed below with their description and options to configure.
This module allows us to see the access points using 'access_points' library. No configuration required.
Option | Required | Description |
---|---|---|
- | - | - |
This module allows us to see the access points using nmcli, the command used is: nmcli dev wifi list
. No configuration required.
Option | Required | Description |
---|---|---|
- | - | - |
With this module you can discover nearby access points by sniffing.
Option | Required | Description |
---|---|---|
channel | False | Network channel. Configure this option if you want to fix it and not 'make jumps' |
iface | True | Network Interface (that allows promiscuous mode) |
This module will connect to a CUPS server and for each printer configured and marked as shared will generate a .service file for avahi that is compatible with Apple's AirPrint announcements.
Option | Required | Description |
---|---|---|
admin | False | Include the printer specified uri as the adminurl |
dir | False | Directory to create service files |
prefix | False | Prefix all files with this string |
rhost | False | Remote host IP |
rport | False | Remote port (Example: 80) |
user | False | Username to authenticate with against CUPS |
verbose | False | Show extra info while running module |
With this module you will be able to pull a specific user out from a specific network. If client is set to broadcast you will kick out all users. If count -1 the attack will be continued until you finish it manually.
Option | Required | Description |
---|---|---|
bssid | True | Access point mac address |
client | False | Target Mac address |
count | False | Number of packets to send (-1 >> infinite in background) |
iface | False | Network interface |
Launch this module to discover nearby printers that have a raised access point.
Option | Required | Description |
---|---|---|
channel | False | Network channel. Configure this option if you want to fix it and not 'make jumps' |
iface | True | Network Interface (that allows promiscuous mode) |
This module will be in charge of raising an access point configured with the different options. Allows you to start Wireshark and Tshark to capture traffic automatically.
Option | Required | Description |
---|---|---|
ap_iface | True | The name of your wireless interface (for the AP) |
channel | True | Network Channel to the AP |
dnsspoof | False | Spoof DNS? |
driftnet | False | Capture unencrypted images with DRIFTNET? |
hostapd_wpa | False | Enable WPA2 encryption? |
net_iface | False | The name of your internet connected interface |
ssid | True | AP SSID to show |
sslstrip | False | Use SSLSTRIP 2.0? |
tshark | False | Capture packets to .pcap with TSHARK? (no gui needed) |
wireshark | False | Start Wireshark? |
wpa_passphrase | False | Please enter the WPA2 passphrase for the AP ('minimum 8 characters') |
proxy | False | Capture traffic? (only works with no sslstrip) |
With this module you can discover stations connected to access points by sniffing. It allows you search for specific venedores devices.
Option | Required | Description |
---|---|---|
channel | False | Network channel. Configure this option if you want to fix it and not 'make jumps' |
iface | True | Network Interface (that allows promiscuous mode) |
vendor | False | Configure filter vendor |