-
Notifications
You must be signed in to change notification settings - Fork 141
modules wifi
In this category you can find all the modules related to WIFI, which will deal with various topics, such as sniffing or deauthentication. To load a module from this category load wifi/module.
| Required | Total modules |
|---|---|
| Network card that works in promiscuous mode | 8 |
The modules are listed below with their description and options to configure.
This module allows us to see the access points using 'access_points' library. No configuration required.
| Option | Required | Description |
|---|---|---|
| - | - | - |
This module allows us to see the access points using nmcli, the command used is: nmcli dev wifi list. No configuration required.
| Option | Required | Description |
|---|---|---|
| - | - | - |
With this module you can discover nearby access points by sniffing.
| Option | Required | Description |
|---|---|---|
| channel | False | Network channel. Configure this option if you want to fix it and not 'make jumps' |
| iface | True | Network Interface (that allows promiscuous mode) |
This module will connect to a CUPS server and for each printer configured and marked as shared will generate a .service file for avahi that is compatible with Apple's AirPrint announcements.
| Option | Required | Description |
|---|---|---|
| admin | False | Include the printer specified uri as the adminurl |
| dir | False | Directory to create service files |
| prefix | False | Prefix all files with this string |
| rhost | False | Remote host IP |
| rport | False | Remote port (Example: 80) |
| user | False | Username to authenticate with against CUPS |
| verbose | False | Show extra info while running module |
With this module you will be able to pull a specific user out from a specific network. If client is set to broadcast you will kick out all users. If count -1 the attack will be continued until you finish it manually.
| Option | Required | Description |
|---|---|---|
| bssid | True | Access point mac address |
| client | False | Target Mac address |
| count | False | Number of packets to send (-1 >> infinite in background) |
| iface | False | Network interface |
Launch this module to discover nearby printers that have a raised access point.
| Option | Required | Description |
|---|---|---|
| channel | False | Network channel. Configure this option if you want to fix it and not 'make jumps' |
| iface | True | Network Interface (that allows promiscuous mode) |
This module will be in charge of raising an access point configured with the different options. Allows you to start Wireshark and Tshark to capture traffic automatically.
| Option | Required | Description |
|---|---|---|
| ap_iface | True | The name of your wireless interface (for the AP) |
| channel | True | Network Channel to the AP |
| dnsspoof | False | Spoof DNS? |
| driftnet | False | Capture unencrypted images with DRIFTNET? |
| hostapd_wpa | False | Enable WPA2 encryption? |
| net_iface | False | The name of your internet connected interface |
| ssid | True | AP SSID to show |
| sslstrip | False | Use SSLSTRIP 2.0? |
| tshark | False | Capture packets to .pcap with TSHARK? (no gui needed) |
| wireshark | False | Start Wireshark? |
| wpa_passphrase | False | Please enter the WPA2 passphrase for the AP ('minimum 8 characters') |
| proxy | False | Capture traffic? (only works with no sslstrip) |
With this module you can discover stations connected to access points by sniffing. It allows you search for specific venedores devices.
| Option | Required | Description |
|---|---|---|
| channel | False | Network channel. Configure this option if you want to fix it and not 'make jumps' |
| iface | True | Network Interface (that allows promiscuous mode) |
| vendor | False | Configure filter vendor |