- To run deaups tool, your network interface needs to be in monitoring mode to allow the tool to create the capture files using
airodump-ng
. You only need to set monitor mode network interface in the command with option i ( -i ) after installing. It will take approximately 14 seconds to capture the fish( wifi ESSID or wifi names ), and then the tool will display their names. Then choose the target wifi name whatever you like.
- subprocess
- time
- sys
- argparse
- inquirer
- re
- random
- string
- os
- datetime
- airodump-ng
- aireplay-ng
To use this tool, there are only 4 steps to configure and don't forget to use 'sudo'. As a first step,
- Run the following command in your terminal.
sudo git clone https://github.com/PSNISC/DeAuPs.git
- Go to the
DeAuPs
directory withcd
( change directory ) commnad.
sudo cd DeAuPs
- In order to use
deaups
command instead ofpython3 install.py
, run the following command in theDeAuPs
directory.
sudo python3 install.py
- Now, run the tool with
deaups
command.
deaups -i <interface>
- Option h ( -h )
deaups -h
- Option h ( -h ) gets used to see options and their descriptions.
- Option i ( -i ), essential for this tool.
deaups -i < wlan0, wlan0mon, etc.. >
- Option i ( -i ) gets used to operate this tool.
- No sleep long option ( --no-sleep )
deaups -i wlan0 --no-sleep
- No sleep long option ( --no-sleep ) gets used to declare for non stop attacking.
- Option a ( -a ) and option s ( -s )
deaups -i wlan0 -a < attack time > -s < sleep time >
- Option a ( -a ) will declare for attack time and option s ( -s ) will declare for sleep time. Attack time must be at least 25 seconds and sleep time must be positive integer, minimum is 1 second.
- The tool will work by sending DeAuth frames to the target client device for 25 seconds and then take a nap for 50 seconds. It will automatically create a directory in the current directory where you run
deaups -i <interface>
after running the script and will create the needed files ( targetBssid.py, targetChannel.py, etc... ) in the created directory. It will continue to work correctly even if the channel has been changed and will stop only when you manually terminate the process by continuously pressing 'Control + C'. Is the target WiFi turned off during the attack? Don't worry about the program not continuing to work. It will wait for the target WiFi you selected to turn on again to resume the attack. Have you ever seen such reliable DeAuth tools before?
- Allow your neighbors to enjoy uninterrupted connectivity 😸