Basic WiFi Commands
Essential Tools
Airgeddon
All-in-one bash script covering WEP, WPA-PSK, WPS, Evil Twin, and Enterprise attacks with a guided menu.
EAPHammer
Focused on WPA-Enterprise attacks, EAP downgrade, and credential capture.
Wifite2
Automates WPS/WEP/WPA-PSK attacks: sets monitor mode, scans, selects targets, and runs appropriate attacks.
wifiphisher
Performs Evil Twin, KARMA, and Known Beacons attacks combined with phishing templates to capture PSKs or portal credentials.
WPS Attacks
WPS (Wi-Fi Protected Setup) uses an 8-digit PIN validated in two halves, giving only ~11,000 effective combinations.WPS Brute Force
WPS Pixie Dust Attack
Some APs use predictable nonces (E-S1, E-S2), making the WPS PIN recoverable offline:Null PIN Attack
WEP
WEP is broken due to the tiny 24-bit IV space, RC4 keystream reuse, and unkeyed CRC32 integrity. A practical break:WPA/WPA2 PSK
PMKID Attack (No Client Needed)
Capture a single EAPOL frame from the AP — no connected client required:WPA Handshake Capture
WPA Enterprise (MGT)
EAP Authentication Methods
EAP-MD5
EAP-MD5
Sends the MD5 hash of the password. Not recommended — vulnerable to dictionary attacks and provides no server authentication.
EAP-TLS
EAP-TLS
Uses both client-side and server-side certificates. Strong when certificates are properly managed.
PEAP-MSCHAPv2
PEAP-MSCHAPv2
Creates a TLS tunnel, then authenticates via MSCHAPv2 inside. The most common enterprise method — the MSCHAPv2 challenge can be captured and cracked.
EAP-TTLS
EAP-TTLS
Provides mutual authentication through an encrypted tunnel. Only server-side certificates required; client uses credentials.
Username Capture
Even with PEAP-EAP-TLS, usernames are sent in plaintext in the EAP “Response Identity” message:Enterprise Evil Twin
EAP Brute-Force (Password Spray)
DoS Attacks
Evil Twin & Rogue AP Attacks
Open Evil Twin
WPA/WPA2 Evil Twin
Lure clients with a matching SSID and WPA2. Without the PSK the 4-way handshake will not complete, but you can capture it for cracking.
KARMA, MANA, and Known Beacons
| Attack | Description |
|---|---|
| KARMA | Rogue AP responds to all probe requests, tricking devices into connecting |
| MANA | Captures PNLs from broadcast probes and responds with known SSIDs |
| Loud MANA | Broadcasts responses for all ESSIDs seen in nearby devices’ PNLs |
| Known Beacons | Brute-forces ESSID list, responding to any name in a wordlist |