WiFi Recon & Attacks
Scan networks and perform WiFi attacks
WiFi Recon & Attacks
This is where you select targets and execute attacks.
Selecting Targets
- Click a network row to select it as the target AP
- Expand the network to see connected clients
- Click client rows to target specific devices (optional)
Deauthentication Attack
Sends deauthentication frames to disconnect clients from their access point.
Broadcast deauth: Targets all clients on the network Targeted deauth: Only disconnects selected clients
Warning: Deauth attacks are illegal without authorization. Only use on networks you own or have explicit permission to test.
Handshake Capture
Captures the WPA 4-way handshake for offline password cracking.
How it works:
- Select target network (must have active clients)
- Click Capture Handshake
- PwnPower sends deauth frames to force re-authentication
- Captures the handshake during reconnection
- Saves as
.pcapfile
Success factors:
- Network must have active clients
- Stronger signal = better capture rate
- More clients = higher success probability
Captured Handshakes
Successful captures appear in the captures list. Each entry shows:
- Target SSID and BSSID
- Channel
- EAPOL frame count
- Capture timestamp
Click any capture to download the .pcap file.
Cracking Handshakes
PwnPower captures handshakes but doesn’t crack them. Use external tools:
# Hashcat (GPU accelerated)
hashcat -m 22000 capture.pcap wordlist.txt
# Aircrack-ng (CPU)
aircrack-ng -w wordlist.txt capture.pcap
General Packet Capture
For broader traffic analysis, use the general capture mode to record all packets on a specific channel. Useful for:
- Traffic analysis
- Protocol debugging
- Capturing non-handshake data