Skip to content

Commit e48da60

Browse files
authored
Update README.md
1 parent 3806350 commit e48da60

File tree

1 file changed

+7
-2
lines changed

1 file changed

+7
-2
lines changed

README.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,11 +26,16 @@ After the attacker chooses a target access point to attack, the program:
2626
```bash
2727
python3 wifi-deauth.py -i <iface>
2828
```
29+
2930
### Usage notes
3031
* `<iface>` is the name of the network interface (i.e `wlan0` or `eth0`) that supports packet injection
31-
* Pass `--kill` (or run `sudo systemctl stop NetworkManager`) in order to kill NetworkManager service which might interfere with the attack
3232
* The initial iteration over all channels might take a minute or two (depends on how many bands the interface supports)
33-
* Pass `--skip-monitormode` if you want to enable monitor mode manually (otherwise the program does it automatically)
33+
34+
### Optional arguments
35+
* `--bssid <name>` - filter for a specific BSSID (this should shorten the channel-scanning duration), beware that the name is case-sensitive and whitespaces should be passed with an escape character (i.e -> `new\ york`)
36+
* `--channels <ch1,ch2>` - scan for specific channels only, otherwise all supported channels will be scanned
37+
* `--kill` (or run `sudo systemctl stop NetworkManager`) - kill NetworkManager service which might interfere with the attack
38+
* `--skip-monitormode` - enable monitor mode manually (otherwise the program does it automatically)
3439

3540
### Misc notes
3641
* Check `ifconfig` to find the interface nickname

0 commit comments

Comments
 (0)