Attacks
The Hacker’s Nightlight is equipped with a suite of WiFi security tools accessible through the web interface. These tools are designed for professional security analysis and educational purposes.
⚠️ Legal Warning: These features are intended for educational and authorized security testing purposes only. Ensure you have explicit permission before testing on any network. Unauthorized network testing may be illegal.
Important Considerations: Operational Modes
The Hacker’s Nightlight’s WiFi security functions operate in different modes. It’s important to understand that you cannot perform all actions simultaneously.
- Scanning vs. Attacking/Capturing: The device must stop scanning for networks to perform a Handshake Capture or a dedicated attack like a Deauthentication Attack. The “Wi-Fi Recon” table will not update while another function is active.
- Handshake Capture and Deauth: While running a Handshake Capture, you can send a “Deauth Burst” on the same channel to help capture a handshake. This is effective because the device doesn’t need to change channels. However, if you run a full Deauthentication Attack on a different channel than your capture target, you will likely miss the handshake, as the radio can only be on one channel at a time.
The tools are organized into several sections, primarily Wi-Fi Recon and Wi-Fi Attacks.
Wi-Fi Recon & Handshake Capture
Discover wireless networks and capture WPA/WPA2 handshakes.
Deauthentication Attack
Disrupt communication between clients and Access Points.
SSID Broadcast (Beacon Spam)
Broadcast hundreds of fake SSIDs to clutter network lists.
DHCP Starvation
Rapidly request DHCP leases to exhaust a target network's address pool.
Generic Packet Capture
Capture and analyze raw wireless packets for detailed network analysis.
Evil Portal
Create an Access Point with a captive portal.