WiFi Recon & Attacks

Scan networks and perform WiFi attacks

WiFi Recon & Attacks

This is where you select targets and execute attacks.

Selecting Targets

  1. Click a network row to select it as the target AP
  2. Expand the network to see connected clients
  3. Click client rows to target specific devices (optional)

Deauthentication Attack

Sends deauthentication frames to disconnect clients from their access point.

Broadcast deauth: Targets all clients on the network Targeted deauth: Only disconnects selected clients

Warning: Deauth attacks are illegal without authorization. Only use on networks you own or have explicit permission to test.

Handshake Capture

Captures the WPA 4-way handshake for offline password cracking.

How it works:

  1. Select target network (must have active clients)
  2. Click Capture Handshake
  3. PwnPower sends deauth frames to force re-authentication
  4. Captures the handshake during reconnection
  5. Saves as .pcap file

Success factors:

  • Network must have active clients
  • Stronger signal = better capture rate
  • More clients = higher success probability

Captured Handshakes

Successful captures appear in the captures list. Each entry shows:

  • Target SSID and BSSID
  • Channel
  • EAPOL frame count
  • Capture timestamp

Click any capture to download the .pcap file.

Cracking Handshakes

PwnPower captures handshakes but doesn’t crack them. Use external tools:

# Hashcat (GPU accelerated)
hashcat -m 22000 capture.pcap wordlist.txt

# Aircrack-ng (CPU)
aircrack-ng -w wordlist.txt capture.pcap

General Packet Capture

For broader traffic analysis, use the general capture mode to record all packets on a specific channel. Useful for:

  • Traffic analysis
  • Protocol debugging
  • Capturing non-handshake data