You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I just released a new version, to include the feature you requested, in this PR: #10
A few notes though -
In addition to knowing which BSSIDs are currently broadcasting, channel-scanning is also needed to determine on which channel each BSSID is operating, and set the network interface to operate on that channel
I did add two new features though, that should significantly shorten the scanning duration:
-b to pass bssid name - once the target bssid is found, scanning stops
-c to pass a custom channel list, instead of scanning all of them
if you know which channel the target bssid is running on, you can even pass both as arguments.
Pretty much as the title suggest.
Add the ability to bypass the scanning phase when supplying an AP BSSID to start attack immediately.
The text was updated successfully, but these errors were encountered: