Categories: Kali Linux

NETATTACK – Scan And Attack Wireless Networks

The  NETATTACK or netattack.py is a python script that enables you to examine your local area WiFi Networks and perform deauthentification attacks. The viability and power of this script exceedingly relies upon your wireless card.

NETATTACK 2 RELEASED

https://github.com/chrizator/netattack2/

Also Read WMD – Weapon of Mass Destruction

USAGE

SCANNING FOR WIFI NETWORKS

python netattack.py -scan -mon

This example will perform a WiFi network scan. The BSSID, ESSID and the Channel will be listet in a table.

-scan | --scan

This parameter must be called when you want to do a scan. It’s one of the main commands. It is searching for beacon frames that are sent by routers to notify there presence.

-mon | --monitor

By calling this parameter the script automatically detects you wireless card and puts it into monitoring mode to capture the ongoing traffic. If you know the name of your wireless card and it’s already working in monitoring mode you can call

-i

This can be used instead of -mon.

DEAUTHENTIFICATION ATTACK

python netattack.py -deauth -b AB:CD:EF:GH:IJ:KL -u 12:34:56:78:91:23 -c 4 -mon

This command will obviously perform a deauthentification attack.

-deauth | --deauth

This parameter is a main parameter as well as scan. It is necessary to call if you want to deauth attack a certain target.

-b | --bssid

With -b you select the AP’s MAC-Address (BSSID). The -deauth parameter requires one or multiple BSSID’s

-u | --client

If you don’t want to attack the whole network, but a single user/client/device, you can do this with -u. It is not necessary.

-c | --channel

By adding this parameter, your deauthentification attack is going to be performed on the entered channel. The usage of -c is highly recommended since the attack will be a failure if the wrong channel is used. The channel of the AP can be seen by doing a WiFi scan (-scan). If you don’t add -c the attack will take place on the current channel.

The -mon or -i is necessary for this attack as well.

DEAUTHENTIFICATION ATTACK ON EVERYBODY

python netattack.py -deauthall -i [IFACE]

When this command is called, the script automatically searches for AP in your area. After the search it start deauth-attacking all of the found AP’s. The -deauthall parameter only needs an interface to get it working. ATTENTION: If you want all of this attacks to be as efficient as possible, have a look at the following “ADVANCED”-section.

REQUIREMENTS

  • Python 2.5+ (not Python 3+)
  • Modules:
    • scapy
    • argparse
    • sys
    • OS
    • threading
    • logging
  • iw(config)
  • OFC LINUX

DISCLAIMER AND LICENSE

THE OWNER AND PRODUCER OF THIS SOFTWARE IS NOT LIABLE FOR ANY DAMAGE OR ANY LAW VIOLATIONS CAUSED BY THE SOFTWARE.

R K

Recent Posts

Install Docker on Ubuntu 26.04 Like a Pro

Docker has become a core tool in modern DevOps and cloud-native development. If you want…

4 minutes ago

How to Install and Secure MySQL on Ubuntu 26.04

If you want to Install MySQL Ubuntu systems for web applications, development environments, or database…

3 hours ago

How to Install PostgreSQL on Ubuntu 26.04

PostgreSQL has become one of the most trusted database systems for developers, enterprises, and cloud…

18 hours ago

How to Install Nginx on Ubuntu 26.04

Nginx continues to dominate the modern web hosting world because of its speed, reliability, and…

21 hours ago

PHP Ubuntu 26.04 Installation Guide for Apache and Nginx

Setting up PHP Ubuntu 26.04 is essential for developers who want to run modern web…

1 day ago

Apache on Ubuntu 26.04 Installation Guide for Beginners

Setting up Apache Ubuntu 26.04 is one of the fastest ways to launch a reliable…

1 day ago