--mac
flag to the program or macchanger
. Its for your safety.wifite.py -i <wlan interface here *NOT IN MONITOR MODE*>
or if you didnt understand the previous command simply use wifite.py
and it will begin scanning for nearby access points and their features (Encryption method and if WPS is enabled or not).Waiting for beacon from 'xx:xx:xx:xx'
. If it gets stuck for a while at this point, press CTRL+C and move on to a different target.aireplay-ng
, which is a great framework, but can be complicated and doesnt support Mass Jamming. Introducing, wifijammer. The README file in the github repo provides great information about the tool and how to use it, so I wont include explanation here either. NOTE: For those tech savvy out there, if you have a RogueAP setup, this tool is perfect to jam all other access points except yours to tempt people into connecting to yours.mdk3
has the ability to flood beacons. They even say that it can crash network scanners and drivers, making it some sort of DoS attack at the same time. So to run this kind of attack, make a text file filled with random beacons (Idea: make them all cuss words, or dynamically generate them with a script or tool like crunch
) and launch the attack like this: mdk3 <mon interface> b -f file-with-names.txt
.