The wifi.*
modules work with a WiFi interface supporting monitor mode and packet injection and they are used to monitor and perform wireless attacks on 802.11.
The interface only needs to support monitor mode and packet injection, it'll be bettercap itself to switch it to the right mode, just make sure there aren't other processes using the same wifi interface.
Commands
command | description |
---|---|
wifi.recon on |
Start 802.11 wireless base stations discovery and handshakes capture. |
wifi.recon off |
Stop 802.11 wireless base stations discovery. |
wifi.clear |
Clear all access points collected by the WiFi discovery module. |
wifi.recon BSSID |
Set 802.11 base station address to filter for. |
wifi.recon clear |
Remove the 802.11 base station filter. |
wifi.assoc BSSID |
Send an association request to the selected BSSID in order to receive a RSN PMKID key (use all , * or ff:ff:ff:ff:ff:ff to iterate for every access point). |
wifi.deauth BSSID |
Start a 802.11 deauth attack, if an access point BSSID is provided, every client will be deauthenticated, otherwise only the selected client (use all , * or ff:ff:ff:ff:ff:ff to deauth everything). |
wifi.show |
Show current wireless stations list (default sorting by RSSI). |
wifi.show.wps BSSID |
Show WPS information about a given station (use all , * or ff:ff:ff:ff:ff:ff to select all). |
wifi.recon.channel CHANNEL |
Comma separated list of channels to hop on. |
wifi.recon.channel clear |
Enable channel hopping on all supported channels. |
wifi.ap |
Inject fake management beacons in order to create a rogue access point ( requires wifi.recon to run ). |
Parameters
parameter | default | description |
---|---|---|
wifi.region |
BO |
Set the WiFi region to this value before activating the interface. |
wifi.txpower |
30 |
Set WiFi transmission power to this value before activating the interface. |
wifi.rssi.min |
-200 |
Minimum WiFi signal strength in dBm. |
wifi.show.manufacturer |
false |
If true, wifi.show will also show the devices manufacturers. |
wifi.show.filter |
Defines a regular expression filter for wifi.show . |
|
wifi.show.sort |
rssi asc |
Defines sorting field (rssi , bssid , essid , channel , encryption , clients , seen , sent , rcvd ) and direction (asc or desc ) for wifi.show . |
wifi.show.sort |
asc |
Defines sorting direction for wifi.show . |
wifi.show.limit |
0 |
If greater than zero, defines limit for wifi.show . |
wifi.hop.period |
250 |
If channel hopping is enabled (empty wifi.recon.channel ), this is the time in millseconds the algorithm will hop on every channel (it'll be doubled if both 2.4 and 5.0 bands are available). |
wifi.handshakes.file |
~/bettercap-wifi-handshakes.pcap |
File path of the pcap file to save handshakes to. |
wifi.source.file |
If set, the wifi module will read from this pcap file instead of the hardware interface. | |
wifi.skip-broken |
true |
If true, dot11 packets with an invalid checksum will be skipped. |
wifi.assoc.skip |
Comma separated list of BSSID to skip while sending association requests. | |
wifi.assoc.silent |
false |
If true, messages from wifi.assoc will be suppressed. |
wifi.assoc.open |
false |
Send association requests to open networks. |
wifi.deauth.skip |
Comma separated list of BSSID to skip while sending deauth packets. | |
wifi.deauth.silent |
false |
If true, messages from wifi.deauth will be suppressed. |
wifi.deauth.open |
true |
Send wifi deauth packets to open networks. |
wifi.ap.ssid |
FreeWifi |
SSID of the fake access point. |
wifi.ap.bssid |
<random mac> |
BSSID of the fake access point. |
wifi.ap.channel |
1 |
Channel of the fake access point. |
wifi.ap.encryption |
true |
If true, the fake access point will use WPA2, otherwise it'll result as an open AP. |
Examples
Starts bettercap on wlan0
, use the ticker and wifi.recon
modules to create a WiFi scanner (performing channel hopping on every supported frequency):
~/ sudo bettercap -iface wlan0
> set ticker.commands "clear; wifi.show"; wifi.recon on; ticker on
Only recon on channels 1, 2 and 3:
> wifi.recon on; wifi.recon.channel 1,2,3
Sort by BSSID and filter for BSSIDs starting with F4
:
> set wifi.show.sort bssid asc
> set wifi.show.filter ^F4
> wifi.show
Filter by access points starting with the string AP
in their ESSID:
> set wifi.show.filter ^AP
> wifi.show
Show top 10 access points sorted by last activity timestamp:
> set wifi.show.sort seen desc
> set wifi.show.limit 10
> wifi.show
Keep deauthing clients from the access point with BSSID DE:AD:BE:EF:DE:AD
every five seconds:
> set ticker.period 5; set ticker.commands "wifi.deauth DE:AD:BE:EF:DE:AD"; ticker on
Will send management beacons as the fake access point "Banana" with BSSID DE:AD:BE:EF:DE:AD
on channel 5 without encryption:
> set wifi.ap.ssid Banana
> set wifi.ap.bssid DE:AD:BE:EF:DE:AD
> set wifi.ap.channel 5
> set wifi.ap.encryption false
> wifi.recon on; wifi.ap
- Known Issues
- Using with Docker
- Compilation
- Interactive Mode and Command Line Arguments
- Changing the Prompt
- Caplets
Modules
- Core
- HID on 2.4Ghz (mousejacking)
- Bluetooth Low Energy
- 802.11
- Ethernet and IP
- Servers
- Rogue Servers
- Utils