A set of actions to help you perform a dictionary brute force attack on a point access WPA3. Wacker utilizes the interface control wpa_supplicant to control daemon operations and to collect information about the target during brute force process attempts.
Useful links archives
The wacker has many details. Its files are in the path / tmp / wpa_supplicant /
- wlan1: one end of the uds
- wlan1_client: one end of the uds
- wlan1.conf: initial wpa_supplicant conf needed
- wlan1.log: supplicant output
- wlan1.pid: pid file for the wpa_supplciant instance
- wlan1_wacker.log: wacker debug output
Use
# ./wacker.py --help usage: wacker.py [-h] --wordlist WORDLIST --interface INTERFACE --bssid BSSID --ssid SSID --freq FREQ [--start START_WORD]
A WPA3 dictionary cracker. Must run as root!
optional arguments: -h, --help show this help message and exit --wordlist WORDLIST wordlist to use --interface INTERFACE interface to use --bssid BSSID bssid of the target --ssid SSID the ssid of the WPA3 AP --freq FREQ frequency of the ap --start START_WORD word to start with in the wordlist
Information about the installation and use of the prelettertos, you will find here.