Saturday, July 29, 2017

WIFIJAMMER



wifi-jamming
The effectiveness of this script is limited wireless card. The Alpha Card appears to be effective than within a block radius with saturation of a tight access point. Granularity is given in options for more effective targeting.

Requires: python 2.7, python-scapy, wireless card capable of inject


python wifijammer.py
 
If the monitor mode interface is active then it will use the first one it finds. Then it will start sequentially skipping channel 1 per second from channels 1 through 11 identifying all access points and clients connected to the access point. On the first line through all wireless channels, this just identifies the target. After that 1sec per channel timeout is omitted and channel is released as soon as the deauth packet is finished sending. Note that it will still add clients and APs because it finds them after the first pass.
After jumping into a new channel, it will identify the target that is on that channel and send 1 deauth packet to the client from the AP, 1 go to the AP from the client, and 1 go to the AP devoted to the broadcast address to eliminate all Clients connected to the AP. Many APs ignore deauth to broadcast addresses.

python wifijammer.py -a 00:0E:DA:DE:24:8E -c 2
 
Deauthenticate all devices with which 00: 0E: DA: DE: 24: 8E communicates and skips the jumping channel by setting the channel to the target AP channel (2 in this case). This will primarily be the access point MAC so that all clients associated with the AP will be deauthenticated, but you can also enter the MAC client here to target one client and other devices that communicate with it.

Advanced

 

python wifijammer.py -c 1 -p 5 -t .00001 -s DL:3D:8D:JJ:39:52 -d --world

    1. -c, Set the monitor mode interface to listen only and remove clients or APs on channel 1 
    2. -p, Send 5 packets to clients from AP and 5 packets to AP from client along with 5 packets to AP broadcast address 
    3. -t, Set a time interval of 0.00001 seconds between sending each deauth (try this if you get a schematic error like 'no buffer space') 
    4. -s, Do not deauth MAC DL: 3D: 8D: JJ: 39: 52. Ignoring certain MAC addresses is useful if you want to tempt people to join your access point if you want to use LAN.py or Pineapple on them. 
    5. -d, Do not send deauth to access broadcast point address; This will speed up deauths to the found clients 
    6. - World, Set max channel to 13. In North America, max channel default is 11, but worldwide uses 13 channels so use this option if you are not in North America.
         Walking/driving around

      The -m option specifies the maximum number of client / AP combos that the script will try to deauth. When the maximum number is reached, it will remove and refill the list based on the traffic it causes in that area. This allows you to keep updating the deauth list with a client / AP combo that has the strongest signal if you are not silent. If you want to set a max and do not have a clear deauth list when hit, add the -n option like: -m 10 -n

      All options:


      python wifijammer.py [-a AP MAC] [-c CHANNEL] [-d] [-i INTERFACE]
       [-m MAXIMUM] [-n] [-p PACKETS] [-s SKIP] [-t TIME INTERVAL]
       
       
       

      No comments:

      Post a Comment