Skip to content

Targeted Active PMKID Sniff workflow

Just Call Me Koko edited this page May 4, 2023 · 4 revisions

Targeted Active PMKID Sniff workflow

The following documentation describes a method of traffic sniffing where WPA handshakes are provoked from client and AP by means of deauthentication attack. Unlike the a general active PMKID sniff, this workflow utilizes a pre-scanned list of access points to ensure only the target devices are disrupted.

  1. Build list of target access points
  • scanap
    image
  1. Display list of available access points
  • list -a
    image
  1. Select a target access points from the list. Multiple access points may be specified
  • select -a 0,1
  1. Verify access points 0 and 1 have been selected with list
  • list -a
    image
  1. Execute a targeted active PMKID sniff
  • sniffpmkid -d -l
Clone this wiki locally