Use the specified monitor mode interface ( -i wlan0mon) and target a single BSSID ( -v de:ad:be:ef:ca:fe): :~# wesside-ng -i wlan0mon -v de:ad:be:ef:ca:fe Parse the provided capture files ( wpa-psk-linksys.cap wpa.cap) and save any 4-way handshakes to a new file ( /root/handshakes.cap): :/usr/share/doc/aircrack-ng/examples# wpaclean /root/handshakes.cap wpa-psk-linksys.cap wpa.cap Specify the input file to use ( -i dump-01.csv), the output file to generate ( -o cpg.png) and the graph type ( -g CAG): :~# airgraph-ng -i dump-01.csv -o cpg.png -g CPGĬreating your Graph using, dump-01.csv and writing to, cpg.png **** WARNING Images can be large, up to 12 Feet by 12 Feet****Ĭreating your Graph using, dump-01.csv and writing to, capr.pngĭepending on your system this can take a bit. Specify the input file to use ( -i dump-01.csv), the output file to generate ( -o capr.png) and the graph type ( -g CAPR): :~# airgraph-ng -i dump-01.csv -o capr.png -g CAPR cap/.pcap format: :~# aircrack-ng all-ivs.ivs To have aircrack-ng conduct a WEP key attack on a capture file, pass it the filename, either in. Specify the wordlist to use ( -w password.lst) and the path to the capture file ( wpa.cap) containing at least one 4-way handshake. myscript.DARK Tool Documentation: aircrack-ng Usage Examples WPA Wordlist Mode Below given command will shutdown our system imediatly when target device comes in range.Ĭommand you want to trigger? :shutdown nowĬommand you want to trigger?.If you want to trigger any command when your target comes in between range then enter a command when it asks. I didn’t add scanning feature in this script but you can get thr MAC Adress easily by executing ‘hcitool scan’ for bluetooth and ‘hcitool lescan’ for BLE Devices in terminal.Īfter running RadareEye, It will ask you ‘Command you want to trigger?’, you can skip it by simply keep it blank and it RadareEye will show you status of your target whether it’s in range or not without triggering any command. Same for the Wifi also with -wifi option, Here XX:XX:XX:XX:XX:XX means your target device’s MAC Address & make sure to do with sudo (if you aren’t root). NOTE:- RadareEye Owner will be not responsible if any user performs malicious activities using this tool. RadareEye is a tool made for specially scanning nearby devices and execute our given command on our system when the target device comes in between range.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |