Skip to content

Configuration

D3Ext edited this page Sep 24, 2025 · 5 revisions

WEF has a configuration file which can be found in /root/.config/wef/wef.cfg and you can edit for your needs, this is the example configuration:

# This is the default configuration file
# This file must be saved as ~/.config/wef/wef.cfg

# Default lenguage to use. Available values: en, es
LANGUAGE=en

# Execute 'airmon check kill' when monitor mode is enabled (this option is useful when using a headless setup)
AIRMON_CHECK_KILL=true

# Automatically enable monitor mode during launch
AUTO_ENABLE_MONITOR=false

# Automatically randomize the MAC address during launch
AUTO_RANDOM_MAC=true

# Enable/disable 5Ghz support (this makes no effect if the network card does not support it)
ENABLE_5GHZ=true

# Pwnagotchi whitelist to avoid attacking APs based on their BSSID
BSSID_WHITELIST=XX:XX:XX:XX:XX:XX

# WPA-SEC private key to upload handshakes (if you do not have one, obtain it here https://wpa-sec.stanev.org/)
WPA_SEC_KEY= 

LANG can be used to change between english and spanish

AIRMON_CHECK_KILL allows you to kill or not active connections with airmon-ng check kill which can be useful in headless systems. Set it to true if you want to kill them or false to not to do it (recommended for headless)

AUTO_ENABLE_MONITOR allows you to directly enable monitor mode automatically each time the tool starts.

AUTO_RANDOM_MAC allows you to randomize the MAC address automatically each time the tool starts.

ENABLE_5GHZ allows you to attack 5Ghz access points. If the network adapter does not support 5Ghz, it will just use 2.4Ghz

BSSID_WHITELIST as its name says, it prevents attacking the APs from this list when using Pwnagotchi mode (allows multiple BSSID separated by comma)

WPA_SEC_KEY requires a valid WPA-SEC key in order to crack handshakes online (this field is completely optional)

Clone this wiki locally