Master wireless deauthentication attacks. Force disconnect clients from access points to capture WPA/WPA2 handshakes for offline cracking.
Wi-Fi deauthentication is a wireless attack that exploits management frames in the 802.11 protocol. These frames are unencrypted and unauthenticated, allowing attackers to forge deauth packets that forcibly disconnect clients from access points. This technique is commonly used for denial of service attacks or to capture WPA/WPA2 handshakes for offline password cracking.
Enable monitor mode on wireless adapter to capture all wireless traffic
airmon-ng start wlan0Scan for access points and connected clients using airodump-ng
airodump-ng wlan0monSend forged deauth frames to disconnect clients
aireplay-ng -0 10 -a [AP_MAC] -c [CLIENT_MAC] wlan0monCapture WPA handshake when client reconnects for offline cracking
Deauthenticate a specific client to capture their handshake
Disconnect all clients simultaneously from an access point
Maintain persistent denial of service by repeatedly deauthing
Performing deauthentication attacks on networks without explicit authorization is illegal in most jurisdictions. This tool is for educational purposes only. Always obtain written permission before conducting wireless security assessments.
Select an access point to begin
No handshakes captured yet
Deauth clients to force reconnection