Attacks
The Hacker’s Nightlight is equipped with a suite of WiFi security tools accessible through the web interface. These tools are designed for professional security analysis and educational purposes.
⚠️ Legal Warning: These features are intended for educational and authorized security testing purposes only. Ensure you have explicit permission before testing on any network. Unauthorized network testing may be illegal.
Important Considerations: Operational Modes
The Hacker’s Nightlight’s WiFi security functions operate in different modes. It’s important to understand that you cannot perform all actions simultaneously.
- Scanning vs. Attacking/Capturing: The device must stop scanning for networks to perform a Handshake Capture or a dedicated attack like a Deauthentication Attack. The “Wi-Fi Recon” table will not update while another function is active.
- Handshake Capture and Deauth: While running a Handshake Capture, you can send a “Deauth Burst” on the same channel to help capture a handshake. This is effective because the device doesn’t need to change channels. However, if you run a full Deauthentication Attack on a different channel than your capture target, you will likely miss the handshake, as the radio can only be on one channel at a time.
The tools are organized into several sections, primarily Wi-Fi Recon and Wi-Fi Attacks.