pr3y / Bruce

Predatory ESP32 Firmware
https://bruce.computer
GNU Affero General Public License v3.0
947 stars 110 forks source link

Workflow: deauth flood + raw sniffer (eapol hs) #472

Open hunt3rbb666NotFound opened 1 day ago

hunt3rbb666NotFound commented 1 day ago

Hi, thank you for this gem. In my opinion, we would need, if we wanted, to be able to keep the flood deauth active in the background so that we could capture the eapols of the hs file that are used for cracking the wifi password. Without keeping the flood deauth active, we have to wait for someone to connect to the wifi we are testing. It's very good that we can already choose the channel and be faster in the attack, but by maintaining the deauth flood you can do it in less than 5 seconds if the distance is right. Thank you again for what you do.

LZ2DMV commented 1 day ago

That is what the Brucegotchi app does, no need to do deauth from the raw sniffer. Just use Brucegotchi.