Skip to content

Attacks Sniffer

Dominik edited this page Jan 4, 2026 · 3 revisions

👁️ Sniffer


Functionality

  • Silent listening to packets between AP and clients.
  • Reports which access points have active clients & their MAC addresses.
  • Ability to temporarily switch to one network to have a full insight how many clients are there
  • Inspect probe requests for hidden SSIDs.

Quick start: sniffer


CLI workflow:

  1. You can start by scanning networks yourself:
scan_networks
  • this grabs a list of networks into memory

1a. Start sniffer witch will scan networks first :

start_sniffer

1b. Alternatively, if you have scanned networks first (0), you can claim sniff without a scan:

start_sniffer_noscan
  1. At any stage, you can print most recent sniffer results:
show_sniffer_results
  1. At any stage, you can pause sniffing without losing your results:
stop
  1. Now, you can narrow (zoom) your sniffing to one network:
select_networks N
  1. And now you can resume sniffing on this selected network only which is way faster and more precise:
start_sniffer
  1. Next, you may want to return to sniffing of the all previously found networks without rescanning:
unselect_networks
start_sniffer_noscan
  1. Show probe requests:
show_probes
  1. Finally you can wipe sniffer results:
stop
clear_sniffer_results
  1. You can also kick out one of the stations:
select_networks N
select_stations MAC
start_deauth

Clone this wiki locally