-
Notifications
You must be signed in to change notification settings - Fork 1
feat: add PMKID support for client-less attacks and enhance capture #2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from all commits
00a1637
b3af419
30c2a6e
a3a4e63
198d803
7b2d8e5
10796ff
db660a9
d2dec76
9a26f35
f174478
9f48957
a1b0def
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change | ||||
|---|---|---|---|---|---|---|
| @@ -1,6 +1,6 @@ | ||||||
| # BrutiFi 🔐 | ||||||
|
|
||||||
| > Modern desktop application for WPA/WPA2 security testing on macOS with real-time feedback | ||||||
| > Simple desktop application for WPA/WPA2 password cracking on macOS | ||||||
|
|
||||||
| [](https://github.com/maxgfr/bruteforce-wifi/releases) | ||||||
| [](https://github.com/maxgfr/bruteforce-wifi/actions) | ||||||
|
|
@@ -9,116 +9,83 @@ | |||||
|
|
||||||
| **⚠️ EDUCATIONAL USE ONLY - UNAUTHORIZED ACCESS IS ILLEGAL ⚠️** | ||||||
|
|
||||||
| A high-performance macOS desktop GUI application for testing WPA/WPA2 password security through offline bruteforce attacks. Built with Rust and Iced, featuring dual cracking engines (Native CPU and Hashcat GPU) for maximum performance. | ||||||
| A simple macOS desktop app for testing WiFi password security. Scan networks, capture handshakes, and crack passwords using CPU or GPU acceleration. | ||||||
|
|
||||||
| ## ✨ Features | ||||||
|
|
||||||
| ### Core Capabilities | ||||||
|
|
||||||
| - 🖥️ **Modern Desktop GUI** - Built with Iced framework for smooth, native experience | ||||||
| - 🖥️ **Simple Desktop GUI** - Clean 2-screen interface built with Iced | ||||||
| - 🚀 **Dual Cracking Engines**: | ||||||
| - **Native CPU**: Custom PBKDF2 implementation with Rayon parallelism (~10K-100K passwords/sec) | ||||||
| - **Hashcat GPU**: 10-100x faster acceleration with automatic device detection | ||||||
| - **Native CPU**: Custom PBKDF2 (~10K-100K passwords/sec) | ||||||
| - **Hashcat GPU**: 10-100x faster with automatic device detection | ||||||
| - 📡 **WiFi Network Scanning** - Real-time discovery with channel detection | ||||||
| - 🎯 **Handshake Capture** - EAPOL frame analysis with visual progress indicators | ||||||
| - 🔑 **Dual Attack Modes**: | ||||||
| - 🔢 Numeric bruteforce (PIN codes: 8-12 digits) | ||||||
| - 🎯 **Two Attack Methods**: | ||||||
| - **4-Way Handshake**: Traditional EAPOL frame capture (requires client reconnection) | ||||||
| - **PMKID**: Clientless attack from beacon frames (no clients needed) | ||||||
|
||||||
| - **PMKID**: Clientless attack from beacon frames (no clients needed) | |
| - **PMKID**: Clientless attack using PMKID from EAPOL M1 frames during AP association (no full client handshake needed) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The documentation in AGENTS.md describes PMKID as extracting from "RSN Information Element in beacon frames" but the actual implementation in handshake.rs (lines 173-208) extracts PMKID from the Key Data field of EAPOL M1 packets, specifically from vendor-specific tags (0xDD) with Microsoft OUI. This is a different source than beacon frame RSN IEs. PMKID can appear in both locations, but the documentation should accurately reflect what the code actually does.