diff --git a/README.md b/README.md index b0640c7..992ae17 100644 --- a/README.md +++ b/README.md @@ -8,6 +8,16 @@ Obviously cracking is not part of this project, as ESP32 is not sufficient to cr Hw components

+## Features +- **PMKID capture** +- **WPA/WPA2 handshake capture** and parsing +- **Deauthentication attacks** using various methods +- **Denial of Service attacks** +- Formatting captured traffic into **PCAP format** +- Parsing captured handshakes into **HCCAPX file** ready to be cracked by Hashcat +- Passive handshake sniffing +- Easily extensible framework for new attacks implementations +- And more... ## Usage 1. Build and flash it onto ESP32 (devkit or module) 1. Power it diff --git a/main/README.md b/main/README.md index 0af518a..002152c 100644 --- a/main/README.md +++ b/main/README.md @@ -36,5 +36,8 @@ This is demonstrated in the following sequence diagram: ### PMKID capture To capture PMKID from AP the only thing we have to do is to initiate connection and get first handshake message from AP. If PMKID is available, AP will send it as part of the first handshake message, so it doesn't matter we don't know the credentials. +### Denial of Service +This reuses deauthentication methods from above and just skips handshake capture. It also allows combination of all deauth methods, which makes it more robust against different behaviour of various devices. + ## Reference Doxygen API reference available \ No newline at end of file