You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+7-2Lines changed: 7 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -26,11 +26,16 @@ After the attacker chooses a target access point to attack, the program:
26
26
```bash
27
27
python3 wifi-deauth.py -i <iface>
28
28
```
29
+
29
30
### Usage notes
30
31
*`<iface>` is the name of the network interface (i.e `wlan0` or `eth0`) that supports packet injection
31
-
* Pass `--kill` (or run `sudo systemctl stop NetworkManager`) in order to kill NetworkManager service which might interfere with the attack
32
32
* The initial iteration over all channels might take a minute or two (depends on how many bands the interface supports)
33
-
* Pass `--skip-monitormode` if you want to enable monitor mode manually (otherwise the program does it automatically)
33
+
34
+
### Optional arguments
35
+
*`--bssid <name>` - filter for a specific BSSID (this should shorten the channel-scanning duration), beware that the name is case-sensitive and whitespaces should be passed with an escape character (i.e -> `new\ york`)
36
+
*`--channels <ch1,ch2>` - scan for specific channels only, otherwise all supported channels will be scanned
37
+
*`--kill` (or run `sudo systemctl stop NetworkManager`) - kill NetworkManager service which might interfere with the attack
38
+
*`--skip-monitormode` - enable monitor mode manually (otherwise the program does it automatically)
0 commit comments