
Run something like airodump-ng on target AP with the channel it already found, to monitor for channel change We run the wash | grep -q "wps_device_password_id", if the button was pushed then we kill everything and use oneshot to connect We launch the Fake AP on the same channel as the original network I also like to add that the whole hostbase wps Phishing attack can be done using only a single adapter ! Using this method Hacking Wi-Fi with cached JavaScript Via Browsers Cache Poisoning Like the most of the networks has mobile phones only connected to them and rarely there is any laptop !Īlso if the target network had A laptop on it it would be super EASY to hack the network with No Phishing at all ! How it's supposed to be able to check the channel change while it's running wpa_cli wps_pbc whenever it's not deauthing using mdk3 !Īlso the thing that the latest version would only work if the target network Has A laptop connected to it.


I also tested the latest hostbase wifislax versionĪnd the channel hopping wasn't working at all ! Is more than enough to check if the button was pushed or not Timeout 10s wash -i wlan0mon -j -b XX:XX:XX:XX:XX:XX -c 8 | grep -q "wps_device_password_id" & echo Pushed || echo NotPushed
