{"id":1405,"date":"2018-05-25T17:04:35","date_gmt":"2018-05-25T11:34:35","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=1405"},"modified":"2018-05-25T17:04:35","modified_gmt":"2018-05-25T11:34:35","slug":"netattack","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/netattack\/","title":{"rendered":"NETATTACK &#8211; Scan And Attack Wireless Networks"},"content":{"rendered":"<p>The\u00a0 NETATTACK or netattack.py is a python script that enables you to examine your local area WiFi Networks and perform deauthentification attacks. The viability and power of this script exceedingly relies upon your wireless card.<\/p>\n<h2><span style=\"color: #008000;\"><strong>NETATTACK 2 RELEASED<\/strong><\/span><\/h2>\n<pre style=\"text-align: center;\"><a href=\"https:\/\/github.com\/chrizator\/netattack2\/\" target=\"_blank\" rel=\"noopener\"><strong>https:\/\/github.com\/chrizator\/netattack2\/<\/strong><\/a><\/pre>\n<h4><strong><span class=\"td_btn td_btn_sm td_3D_btn\">Also Read<\/span>\u00a0<a href=\"https:\/\/kalilinuxtutorials.com\/wmd-weapon-mass-destruction\/\" target=\"_blank\" rel=\"noopener\">WMD &#8211; Weapon of Mass Destruction<\/a><\/strong><\/h4>\n<h2 style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>USAGE<\/strong><\/span><\/h2>\n<h4><strong>SCANNING FOR WIFI NETWORKS<\/strong><\/h4>\n<pre><code>python netattack.py -scan -mon\n<\/code><\/pre>\n<p>This example will perform a WiFi network scan. The BSSID, ESSID and the Channel will be listet in a table.<\/p>\n<pre><code>-scan | --scan\n<\/code><\/pre>\n<p>This parameter must be called when you want to do a scan. It&#8217;s one of the main commands. It is searching for beacon frames that are sent by routers to notify there presence.<\/p>\n<pre><code>-mon | --monitor\n<\/code><\/pre>\n<p>By calling this parameter the script automatically detects you wireless card and puts it into monitoring mode to capture the ongoing traffic. If you know the name of your wireless card and it&#8217;s already working in monitoring mode you can call<\/p>\n<pre><code>-i\n<\/code><\/pre>\n<p>This can be used instead of <code>-mon<\/code>.<\/p>\n<h4><strong>DEAUTHENTIFICATION ATTACK<\/strong><\/h4>\n<pre><code>python netattack.py -deauth -b AB:CD:EF:GH:IJ:KL -u 12:34:56:78:91:23 -c 4 -mon\n<\/code><\/pre>\n<p>This command will obviously perform a deauthentification attack.<\/p>\n<pre><code>-deauth | --deauth\n<\/code><\/pre>\n<p>This parameter is a main parameter as well as scan. It is necessary to call if you want to deauth attack a certain target.<\/p>\n<pre><code>-b | --bssid\n<\/code><\/pre>\n<p>With <code>-b<\/code> you select the AP&#8217;s MAC-Address (BSSID). The <code>-deauth<\/code> parameter requires one or multiple BSSID&#8217;s<\/p>\n<pre><code>-u | --client\n<\/code><\/pre>\n<p>If you don&#8217;t want to attack the whole network, but a single user\/client\/device, you can do this with <code>-u<\/code>. It is not necessary.<\/p>\n<pre><code>-c | --channel\n<\/code><\/pre>\n<p>By adding this parameter, your deauthentification attack is going to be performed on the entered channel. The usage of <code>-c<\/code> is highly recommended since the attack will be a failure if the wrong channel is used. The channel of the AP can be seen by doing a WiFi scan (<code>-scan<\/code>). If you don&#8217;t add <code>-c<\/code> the attack will take place on the current channel.<\/p>\n<p>The <code>-mon<\/code> or <code>-i<\/code> is necessary for this attack as well.<\/p>\n<h4><strong>DEAUTHENTIFICATION ATTACK ON EVERYBODY<\/strong><\/h4>\n<pre><code>python netattack.py -deauthall -i [IFACE]\n<\/code><\/pre>\n<p>When this command is called, the script automatically searches for AP in your area. After the search it start deauth-attacking all of the found AP&#8217;s. The <code>-deauthall<\/code> parameter only needs an interface to get it working. ATTENTION: If you want all of this attacks to be as efficient as possible, have a look at the following &#8220;ADVANCED&#8221;-section.<\/p>\n<h2><span style=\"color: #008000;\"><strong>REQUIREMENTS<\/strong><\/span><\/h2>\n<ul>\n<li>Python 2.5+ (not Python 3+)<\/li>\n<li>Modules:\n<ul>\n<li>scapy<\/li>\n<li>argparse<\/li>\n<li>sys<\/li>\n<li>OS<\/li>\n<li>threading<\/li>\n<li>logging<\/li>\n<\/ul>\n<\/li>\n<li>iw(config)<\/li>\n<li>OFC LINUX<\/li>\n<\/ul>\n<h2><strong><span style=\"color: #008000;\">DISCLAIMER AND LICENSE<\/span><\/strong><\/h2>\n<p>THE OWNER AND PRODUCER OF THIS SOFTWARE IS NOT LIABLE FOR ANY DAMAGE OR ANY LAW VIOLATIONS CAUSED BY THE SOFTWARE.<\/p>\n<p><a href=\"https:\/\/github.com\/chrizator\/netattack\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-999\" src=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png\" alt=\"\" width=\"141\" height=\"40\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The\u00a0 NETATTACK or netattack.py is a python script that enables you to examine your local area WiFi Networks and perform deauthentification attacks. The viability and power of this script exceedingly relies upon your wireless card. NETATTACK 2 RELEASED https:\/\/github.com\/chrizator\/netattack2\/ Also Read\u00a0WMD &#8211; Weapon of Mass Destruction USAGE SCANNING FOR WIFI NETWORKS python netattack.py -scan -mon [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[2190,3688,3754],"class_list":["post-1405","post","type-post","status-publish","format-standard","hentry","category-kali","tag-netattack","tag-wifi","tag-wireless-networks"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NETATTACK - Scan And Attack Wireless Networks<\/title>\n<meta name=\"description\" content=\"The NETATTACK or netattack.py is a python script that enables you to examine your local area WiFi Networks and perform deauthentification attacks. The viability and power of this script exceedingly relies upon your wireless card.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/netattack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NETATTACK - Scan And Attack Wireless Networks\" \/>\n<meta property=\"og:description\" content=\"The NETATTACK or netattack.py is a python script that enables you to examine your local area WiFi Networks and perform deauthentification attacks. The viability and power of this script exceedingly relies upon your wireless card.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/netattack\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-25T11:34:35+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/netattack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/netattack\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"NETATTACK &#8211; Scan And Attack Wireless Networks\",\"datePublished\":\"2018-05-25T11:34:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/netattack\/\"},\"wordCount\":407,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/netattack\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png\",\"keywords\":[\"NETATTACK\",\"wifi\",\"Wireless Networks\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/netattack\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/netattack\/\",\"name\":\"NETATTACK - Scan And Attack Wireless Networks\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/netattack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/netattack\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png\",\"datePublished\":\"2018-05-25T11:34:35+00:00\",\"description\":\"The NETATTACK or netattack.py is a python script that enables you to examine your local area WiFi Networks and perform deauthentification attacks. The viability and power of this script exceedingly relies upon your wireless card.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/netattack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/netattack\/#primaryimage\",\"url\":\"http:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png\",\"contentUrl\":\"http:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NETATTACK - Scan And Attack Wireless Networks","description":"The NETATTACK or netattack.py is a python script that enables you to examine your local area WiFi Networks and perform deauthentification attacks. The viability and power of this script exceedingly relies upon your wireless card.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/netattack\/","og_locale":"en_US","og_type":"article","og_title":"NETATTACK - Scan And Attack Wireless Networks","og_description":"The NETATTACK or netattack.py is a python script that enables you to examine your local area WiFi Networks and perform deauthentification attacks. The viability and power of this script exceedingly relies upon your wireless card.","og_url":"https:\/\/kalilinuxtutorials.com\/netattack\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2018-05-25T11:34:35+00:00","og_image":[{"url":"http:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/netattack\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/netattack\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"NETATTACK &#8211; Scan And Attack Wireless Networks","datePublished":"2018-05-25T11:34:35+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/netattack\/"},"wordCount":407,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/netattack\/#primaryimage"},"thumbnailUrl":"http:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png","keywords":["NETATTACK","wifi","Wireless Networks"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/netattack\/","url":"https:\/\/kalilinuxtutorials.com\/netattack\/","name":"NETATTACK - Scan And Attack Wireless Networks","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/netattack\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/netattack\/#primaryimage"},"thumbnailUrl":"http:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png","datePublished":"2018-05-25T11:34:35+00:00","description":"The NETATTACK or netattack.py is a python script that enables you to examine your local area WiFi Networks and perform deauthentification attacks. The viability and power of this script exceedingly relies upon your wireless card.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/netattack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/netattack\/#primaryimage","url":"http:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png","contentUrl":"http:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":32877,"url":"https:\/\/kalilinuxtutorials.com\/wifi-hacking-py\/","url_meta":{"origin":1405,"position":0},"title":"Wifi-Hacking.py : Your Ultimate Guide To Ethical WiFi Penetration Testing","author":"Varshini","date":"April 29, 2024","format":false,"excerpt":"Unlock the potential of ethical hacking with Wifi-Hacking.py, a powerful cybersecurity tool designed to navigate the complexities of WiFi security. This robust tool offers a suite of features to monitor, attack, and secure wireless networks, making it a must-have for security professionals and enthusiasts alike. Dive into the capabilities of\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgEugxRX3YqXGOyskx5VKZ21BxxU6N8E0LXB5odwob-TdYBOWZqJSuQY45sZwz5MUNYn0jbUS-q7MC2HBOiL8852yvJglKfRYHO3AHZeACGDg8Gk4osagiq_HOfPqkejxZAqqZf3ZzKieto0s5X-bhOjkQEStDiIC90guH-C7YRhYRmAbxibeJmFMwXFa_t\/s16000\/MagicDot%20%282%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgEugxRX3YqXGOyskx5VKZ21BxxU6N8E0LXB5odwob-TdYBOWZqJSuQY45sZwz5MUNYn0jbUS-q7MC2HBOiL8852yvJglKfRYHO3AHZeACGDg8Gk4osagiq_HOfPqkejxZAqqZf3ZzKieto0s5X-bhOjkQEStDiIC90guH-C7YRhYRmAbxibeJmFMwXFa_t\/s16000\/MagicDot%20%282%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgEugxRX3YqXGOyskx5VKZ21BxxU6N8E0LXB5odwob-TdYBOWZqJSuQY45sZwz5MUNYn0jbUS-q7MC2HBOiL8852yvJglKfRYHO3AHZeACGDg8Gk4osagiq_HOfPqkejxZAqqZf3ZzKieto0s5X-bhOjkQEStDiIC90guH-C7YRhYRmAbxibeJmFMwXFa_t\/s16000\/MagicDot%20%282%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgEugxRX3YqXGOyskx5VKZ21BxxU6N8E0LXB5odwob-TdYBOWZqJSuQY45sZwz5MUNYn0jbUS-q7MC2HBOiL8852yvJglKfRYHO3AHZeACGDg8Gk4osagiq_HOfPqkejxZAqqZf3ZzKieto0s5X-bhOjkQEStDiIC90guH-C7YRhYRmAbxibeJmFMwXFa_t\/s16000\/MagicDot%20%282%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgEugxRX3YqXGOyskx5VKZ21BxxU6N8E0LXB5odwob-TdYBOWZqJSuQY45sZwz5MUNYn0jbUS-q7MC2HBOiL8852yvJglKfRYHO3AHZeACGDg8Gk4osagiq_HOfPqkejxZAqqZf3ZzKieto0s5X-bhOjkQEStDiIC90guH-C7YRhYRmAbxibeJmFMwXFa_t\/s16000\/MagicDot%20%282%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgEugxRX3YqXGOyskx5VKZ21BxxU6N8E0LXB5odwob-TdYBOWZqJSuQY45sZwz5MUNYn0jbUS-q7MC2HBOiL8852yvJglKfRYHO3AHZeACGDg8Gk4osagiq_HOfPqkejxZAqqZf3ZzKieto0s5X-bhOjkQEStDiIC90guH-C7YRhYRmAbxibeJmFMwXFa_t\/s16000\/MagicDot%20%282%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":9403,"url":"https:\/\/kalilinuxtutorials.com\/wifi-hacker\/","url_meta":{"origin":1405,"position":1},"title":"WiFi Hacker : Shell Script For Attacking Wireless Connections Using Built-In Kali Tools","author":"R K","date":"February 28, 2020","format":false,"excerpt":"Wifi hacker is a shell script for attacking wireless connections using built-in kali tools. Supports All Securities (WEP, WPS, WPA, WPA2). Also Read - Ohmybackup : Scan Victim Backup Directories & Backup Files Download","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":18244,"url":"https:\/\/kalilinuxtutorials.com\/owt\/","url_meta":{"origin":1405,"position":2},"title":"Owt : The Most Compact WiFi Auditing Tool That Works On Command Line Linux","author":"R K","date":"September 22, 2021","format":false,"excerpt":"Owt compiles some necessary tools for wifi auditing in a unix bash script with a user friendly interface. The goal of owt is to have the smallest file size possible while still functioning at maximum proficiency. Installation & Running The Script ~ $ git clone https:\/\/github.com\/clu3bot\/OWT.git~ $ cd owt~ $\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/1.bp.blogspot.com\/-K10ftrYOV8I\/YTreqKFnq-I\/AAAAAAAAKyc\/IWRO3H05jkU8Nz7BQLCG29TACUwwu-X6QCLcBGAsYHQ\/s728\/img6%2B%25281%2529.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/1.bp.blogspot.com\/-K10ftrYOV8I\/YTreqKFnq-I\/AAAAAAAAKyc\/IWRO3H05jkU8Nz7BQLCG29TACUwwu-X6QCLcBGAsYHQ\/s728\/img6%2B%25281%2529.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/1.bp.blogspot.com\/-K10ftrYOV8I\/YTreqKFnq-I\/AAAAAAAAKyc\/IWRO3H05jkU8Nz7BQLCG29TACUwwu-X6QCLcBGAsYHQ\/s728\/img6%2B%25281%2529.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/1.bp.blogspot.com\/-K10ftrYOV8I\/YTreqKFnq-I\/AAAAAAAAKyc\/IWRO3H05jkU8Nz7BQLCG29TACUwwu-X6QCLcBGAsYHQ\/s728\/img6%2B%25281%2529.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":33005,"url":"https:\/\/kalilinuxtutorials.com\/cify-a-wifi-hacking-tool\/","url_meta":{"origin":1405,"position":3},"title":"Cify &#8211; A WiFi Hacking Tool","author":"Varshini","date":"May 10, 2024","format":false,"excerpt":"Cify is a Ruby-based WiFi hacking tool designed for penetration testers, security researchers, and network administrators to assess the security of WiFi networks. The tool aims to simplify the process of scanning networks, deauthenticating clients, and cracking WiFi passwords using the popular Aircrack-ng suite. Cify provides a user-friendly terminal interface,\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjaz0svFT_7QA-a8E0DDaPcC8gPsGz4XZVeKHCeB9gKgoTSuf3qXOnKkKUhg5dUh2v9z7i3kQPRIXBODYZkIsZixpfNzZAvxkdxHMtQWmyHKJuon3sm9LpbMmAJLru1KaT6J9-54taakT3_RAAz2r9xpe3A4ypRCv1dYzPrKPuFY2seFYY5DDb_ahgdZe2V\/s16000\/Cify%20-%20A%20WiFi%20Hacking%20Tool.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjaz0svFT_7QA-a8E0DDaPcC8gPsGz4XZVeKHCeB9gKgoTSuf3qXOnKkKUhg5dUh2v9z7i3kQPRIXBODYZkIsZixpfNzZAvxkdxHMtQWmyHKJuon3sm9LpbMmAJLru1KaT6J9-54taakT3_RAAz2r9xpe3A4ypRCv1dYzPrKPuFY2seFYY5DDb_ahgdZe2V\/s16000\/Cify%20-%20A%20WiFi%20Hacking%20Tool.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjaz0svFT_7QA-a8E0DDaPcC8gPsGz4XZVeKHCeB9gKgoTSuf3qXOnKkKUhg5dUh2v9z7i3kQPRIXBODYZkIsZixpfNzZAvxkdxHMtQWmyHKJuon3sm9LpbMmAJLru1KaT6J9-54taakT3_RAAz2r9xpe3A4ypRCv1dYzPrKPuFY2seFYY5DDb_ahgdZe2V\/s16000\/Cify%20-%20A%20WiFi%20Hacking%20Tool.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjaz0svFT_7QA-a8E0DDaPcC8gPsGz4XZVeKHCeB9gKgoTSuf3qXOnKkKUhg5dUh2v9z7i3kQPRIXBODYZkIsZixpfNzZAvxkdxHMtQWmyHKJuon3sm9LpbMmAJLru1KaT6J9-54taakT3_RAAz2r9xpe3A4ypRCv1dYzPrKPuFY2seFYY5DDb_ahgdZe2V\/s16000\/Cify%20-%20A%20WiFi%20Hacking%20Tool.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjaz0svFT_7QA-a8E0DDaPcC8gPsGz4XZVeKHCeB9gKgoTSuf3qXOnKkKUhg5dUh2v9z7i3kQPRIXBODYZkIsZixpfNzZAvxkdxHMtQWmyHKJuon3sm9LpbMmAJLru1KaT6J9-54taakT3_RAAz2r9xpe3A4ypRCv1dYzPrKPuFY2seFYY5DDb_ahgdZe2V\/s16000\/Cify%20-%20A%20WiFi%20Hacking%20Tool.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjaz0svFT_7QA-a8E0DDaPcC8gPsGz4XZVeKHCeB9gKgoTSuf3qXOnKkKUhg5dUh2v9z7i3kQPRIXBODYZkIsZixpfNzZAvxkdxHMtQWmyHKJuon3sm9LpbMmAJLru1KaT6J9-54taakT3_RAAz2r9xpe3A4ypRCv1dYzPrKPuFY2seFYY5DDb_ahgdZe2V\/s16000\/Cify%20-%20A%20WiFi%20Hacking%20Tool.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":1415,"url":"https:\/\/kalilinuxtutorials.com\/wifi-bruteforcer\/","url_meta":{"origin":1405,"position":4},"title":"WiFi Bruteforcer &#8211; Android Application To Brute Force WiFi Passwords","author":"R K","date":"May 26, 2018","format":false,"excerpt":"WiFi Bruteforcer is an android application to brute force WiFi passwords without requiring a rooted device. WARNING: This project is still under development and by installing the app may misconfigure the Wi-Fi settings of your Android OS, a system restore may be necessary to fix it. Also Read\u00a0NETATTACK - Scan\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/05\/WiFi.jpg?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/05\/WiFi.jpg?resize=350%2C200 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/05\/WiFi.jpg?resize=525%2C300 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/05\/WiFi.jpg?resize=700%2C400 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/05\/WiFi.jpg?resize=1050%2C600 3x"},"classes":[]},{"id":1501,"url":"https:\/\/kalilinuxtutorials.com\/wifite-wireless-attack-tool\/","url_meta":{"origin":1405,"position":5},"title":"Wifite 2.1.0 &#8211; Automated Wireless Attack Tool","author":"R K","date":"June 8, 2018","format":false,"excerpt":"A complete re-write of wifite, a Python script for auditing wireless networks. Wifite runs existing wireless-auditing tools for you. Stop memorizing command arguments & switches! What's new in Wifite 2.1.0? Less bugs Cleaner process management. Does not leave processes running in the background (the old wifite was bad about this).\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/06\/1.gif?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/06\/1.gif?resize=350%2C200 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/06\/1.gif?resize=525%2C300 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/06\/1.gif?resize=700%2C400 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/06\/1.gif?resize=1050%2C600 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/06\/1.gif?resize=1400%2C800 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/1405","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=1405"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/1405\/revisions"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=1405"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=1405"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=1405"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}