Attacks

The Hacker’s Nightlight is equipped with a suite of WiFi security tools accessible through the web interface. These tools are designed for professional security analysis and educational purposes.

⚠️ Legal Warning: These features are intended for educational and authorized security testing purposes only. Ensure you have explicit permission before testing on any network. Unauthorized network testing may be illegal.

Important Considerations: Operational Modes

The Hacker’s Nightlight’s WiFi security functions operate in different modes. It’s important to understand that you cannot perform all actions simultaneously.

  • Scanning vs. Attacking/Capturing: The device must stop scanning for networks to perform a Handshake Capture or a dedicated attack like a Deauthentication Attack. The “Wi-Fi Recon” table will not update while another function is active.
  • Handshake Capture and Deauth: While running a Handshake Capture, you can send a “Deauth Burst” on the same channel to help capture a handshake. This is effective because the device doesn’t need to change channels. However, if you run a full Deauthentication Attack on a different channel than your capture target, you will likely miss the handshake, as the radio can only be on one channel at a time.

The tools are organized into several sections, primarily Wi-Fi Recon and Wi-Fi Attacks.