How to use PiDense to monitor malicious wireless network activities

0 21
The current version of PiDense supports monitoring the following malicious wirel...

How to use PiDense to monitor malicious wireless network activities

The current version of PiDense supports monitoring the following malicious wireless network activities:

1, Similar SSID broadcasts;

2, Detect SSID brute force;

3, Detect beacon flooding;

4, Monitor de-authentication attacks;

5, Same SSID broadcasts;

6, Calculate the density of unencrypted wireless networks;

7, Monitor SSID broadcasts in the blacklist;

8, KARMA attack;

9, WiFi Pineapple activity;

Tool requirements

Hardware: TP-LINK TL-WN722N

Software: scapy, time, termcolor, argparse

Tool installation

Since this tool is developed based on Python, we first need to install and configure the Python environment on the local device.

Next, researchers can use the following commands to clone the source code of this project locally:

git clone https://github.com/WiPi-Hunter/PiDense.git

Tool usage

Running in monitor mode

airmon-ng start interface(wlan0,wlan1) (Monitor mode)

or

ifconfig wlan0 down

iwconfig wlan0 mode Monitor

ifconfig wlan0 up

View tool help information

cd PiDense

python pidense.py -h

Tool usage screenshot

Tool usage demonstration

Demonstration video:【Click to watch

License Agreement

The development and release of this project followGPL-3.0Open Source License Agreement.

Project address

PiDense:【GitHub link

你可能想看:

d) Adopt identification technologies such as passwords, password technologies, biometric technologies, and combinations of two or more to identify users, and at least one identification technology sho

Data security can be said to be a hot topic in recent years, especially with the rapid development of information security technologies such as big data and artificial intelligence, the situation of d

In today's rapidly developing digital economy, data has become an important engine driving social progress and enterprise development. From being initially regarded as part of intangible assets to now

Ensure that the ID can be accessed even if it is guessed or cannot be tampered with; the scenario is common in resource convenience and unauthorized vulnerability scenarios. I have found many vulnerab

Common attack methods used to conceal real IP addresses in network attacks and methods for tracing and tracing false IP addresses

Internal and external cultivation | Under the high-confrontation offensive and defensive, internal network security cannot be ignored

Comprehensive Guide to Linux Two-factor Identity Authentication: ssh + console + graphical interface

Dynamic CNN model for identifying fake personal profiles in online social networks

5. Collect exercise results The main person in charge reviews the exercise results, sorts out the separated exercise issues, and allows the red and blue sides to improve as soon as possible. The main

As announced today, Glupteba is a multi-component botnet targeting Windows computers. Google has taken action to disrupt the operation of Glupteba, and we believe this action will have a significant i

最后修改时间:
admin
上一篇 2025年03月29日 22:25
下一篇 2025年03月29日 22:48

评论已关闭