WiFiBroot v1.4 releases: A WiFi Pentest Cracking tool for WPA/WPA2
A WiFi-Pentest-Cracking tool for WPA/WPA2 (Handshake, PMKID, Offline Cracking, EAPOLS, Deauthentication Attack).
WiFiBroot is built to provide clients with an all-in-one facility for cracking WiFi (WPA/WPA2) networks. It heavily depends on scapy, a well-featured packet manipulation library in Python. Almost every process within is dependent somehow on scapy layers and other functions except for operating the wireless interface on a different channel. That will be done via native Linux command iwconfig for which you may be need sudo privileges. It currently provides four independent working modes to deal with the target networks. Two of them are online cracking methods while the other runs in offline mode. The offline mode is provided to crack saved hashes from the first two modes. One is for the deauthentication attack on the wireless network and can also be used as a jamming handler. It can be run on a variety of Linux platforms and at least requires WN727N from tp-link to properly operate.
- Major Bugs Fixed.
- Ported Back to Python 2.
- Ported alongside Scapy
git clone https://github.com/hash3liZer/WiFiBroot.git
sudo pip install scapy
WiFiBroot uses modes to identify which attack you want to perform on your target. Currently, there are three available modes. The usage of each mode can be seen by supplying the –help/-h option right after the -m/–mode option. Here’s a list of available modes and what they do:
Each mode has a specific purpose and has it’s own options:
DEAUTHENTICATION ATTACK (Stress Testing)
Copyright (C) 2018 hash3liZer