A set of actions to help you execute a brute force attack with a dictionary at a WPA3 access point. Wacker utilizes the wpa_supplicant control interface to control daemon functions and to collect target information during brute force process attempts.
Useful files
The wacker has many details. Its files are in the path / tmp / wpa_supplicant /
- wlan1: one end of the uds
- wlan1_client: one end of the uds
- wlan1.conf: initial wpa_supplicant conf needed
- wlan1.log: supplicant output
- wlan1.pid: pid file for the wpa_supplciant instance
- wlan1_wacker.log: wacker debug output
Use
# ./brave.py --help |
|
usage: brave.py [-h] --wordlist WORDLIST --interface INTERFACE --bssid BSSID |
|
--ssid SSID --freq FREQ [--start START_WORD] |
A WPA3 dictionary cracker. Must run as root!
optional arguments: |
|
-h, --help show this help message and exit |
|
--wordlist WORDLIST wordlist to use |
|
--interface INTERFACE |
|
interface to use |
|
--bssid BSSID bssid of the target |
|
--ssid SSID the ssid of the WPA3 AP |
|
--freq FREQ frequency of the ap |
|
--start START_WORD word to start with in the wordlist |
Information on installing and using the program, you will find here.
Read them Technology News from all over the world, with the validity of iGuRu.gr
Follow us on Google News
Comment Policy:
IGuRu.gr does not publish the comments immediately. Malicious comments, comments that include ads, or comments that are offensive are deleted without notice. We do not adopt the opinions expressed by our readers.
Your comments will be displayed after approval by the administrators