githubEdit

Wireless Testing

WiFi Attacks

Reconnaissance

# Enable monitor mode
airmon-ng start wlan0
# or
ip link set wlan0 down
iw dev wlan0 set type monitor
ip link set wlan0 up

# Scan for networks
airodump-ng wlan0mon
airodump-ng wlan0mon --band abg  # All bands
airodump-ng wlan0mon -c 6 --bssid AA:BB:CC:DD:EE:FF -w capture  # Target specific AP

# Kismet (comprehensive wireless scanner)
kismet -c wlan0mon

WPA/WPA2 PSK Attacks

WPA3 Attacks

WPA Enterprise Attacks

WEP Attacks (Legacy)

Rogue Access Point

WiFi Pineapple Techniques

Bluetooth Attacks

Reconnaissance

BlueBorne (CVE-2017-0781, CVE-2017-0782, etc.)

KNOB Attack (CVE-2019-9506)

BLE (Bluetooth Low Energy)

Bluetooth Sniffing

RFID/NFC Attacks

Proxmark3

NFC Tools (Android)

Badge Cloning

Wireless IDS Evasion

Channel Hopping

MAC Spoofing

Signal Strength Control

Tools Summary

Tool
Purpose

aircrack-ng suite

WiFi cracking

Wifiphisher

Evil twin attacks

Kismet

Wireless recon

hcxtools

PMKID attacks

Bettercap

MITM framework

Proxmark3

RFID/NFC

Ubertooth

Bluetooth sniffing

Flipper Zero

Multi-protocol

Resources

Last updated

Was this helpful?