Added --nodeauths command, try to fix WEP replay attacks.

Aireplay can optionally NOT store the process output (via `devnull=False`).
By-default, Aireplay attacks will not capture aireplay-ng output, to
avoid deadlock when overloading the OS buffer (see #21).
This commit is contained in:
derv82
2017-05-15 20:36:04 -04:00
parent a8d16d1b69
commit a226cdb9a1
8 changed files with 39 additions and 22 deletions

View File

@@ -36,6 +36,7 @@ class Configuration(object):
Configuration.five_ghz = False # Scan 5Ghz channels
Configuration.pillage = False # "All" mode to attack everything
Configuration.random_mac = False
Configuration.no_deauth = False # Deauth hidden networks & WPA handshake targets
Configuration.encryption_filter = ['WEP', 'WPA', 'WPS']
@@ -127,6 +128,9 @@ class Configuration(object):
if args.five_ghz == True:
Configuration.five_ghz = True
Color.pl('{+} {C}option:{W} including {G}5Ghz networks{W} in scans')
if args.no_deauth == True:
Configuration.no_deauth = True
Color.pl('{+} {C}option:{W} will {R}not{W} {O}deauth{W} clients during scans or captures')
if args.target_essid:
Configuration.target_essid = args.target_essid
Color.pl('{+} {C}option:{W} targeting ESSID {G}%s{W}' % args.target_essid)