you have a firmware to support Monitor Mode on your wireless interface.Add a persistent alias to a device (by MAC) for easier identification.Export all gathered information to a file.Sort and filter Access Points and Stations with many parameters.Create custom actions and run them on an access point or a client easily.Set commands to enable and disable monitor mode automatically.Includes the Nexmon driver, required library and management utility for BCM4339 and BCM4358 devices.Includes the required tools, no need for manual installation.Copy commands or MAC addresses to clipboard.Leave the app running in the background, optionally with a notification.Reaver WPS cracking (pixie-dust attack using NetHunter chroot and external adapter).Capture a WPA handshake or gather IVs to crack a WEP network.MDK3 Authentication DoS for a specific network or to every nearby AP.MDK3 Beacon Flooding with custom options and SSID list.Deauthenticate a specific client from the network it's connected.Deauthenticate all the clients of a network (either targeting each one (effective) or without specific target).See the signal power of devices and filter the ones that are closer to you.See the manufacturer of a device (AP or station) from the OUI database.Statistics about access points and stations.View the activity of a specific network (by measuring beacons and data packets) and its clients.View a list of access points and stations (clients) around you (even hidden ones).Bug reports are also welcome as long as they come from the latest released version, since some of this code might be used in the new project. Critical changes may still be provided, along with help for building, maintaining, and updating the code (though I wouldn't recomment it). Since the new version will not be available for a long time, this repo remains open for recommendations and feature requests which will be implemented in the new version. The app has been discontinued since a completely new iteration is currently under development. Root access is also necessary, as these tools need root to work. The Nexmon firmware and management utility for BCM4339 and BCM4358 are also included. The required tools are included for ARM devices. Devices that use BCM4330 can use bcmon.Īn alternative would be to use an external adapter that supports monitor mode in Android with an OTG cable. Any device that uses the BCM4339 chipset (MSM8974, such as Nexus 5, Xperia Z1/Z2, LG G2, LG G Flex, Samsung Galaxy Note 3) will work with Nexmon (which also supports some other chipsets). This means that you will need a custom firmware. A few android devices do, but none of them natively. This application requires an ARM android device with an internal wireless adapter that supports Monitor Mode. It offers a simple and easy UI to use these tools without typing commands in a console and copy&pasting MAC addresses. Hijacker is a Graphical User Interface for the penetration testing tools Aircrack-ng, Airodump-ng, MDK3 and Reaver.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |