Hijacker is a Graphical User Interface for the wireless auditing tools airodump-ng, aireplay-ng and mdk3. It offers a simple and easy UI to use these tools without typing commands in a console and copy&pasting MAC addresses.
Hijacker is a Graphical User Interface for the wireless auditing tools airodump-ng, aireplay-ng and mdk3. It offers a simple and easy UI to use these tools without typing commands in a console and copy&pasting MAC addresses.
Supporting Device
- Device that uses the BCM4339 chipset will work with Nexmon.
- Device that uses the BCM4330 chipset will work with bcmon.
An alternative would be to use an external adapter that supports monitor mode in Android with an OTG cable.
Requirement
- airodump-ng / aireplay-ng / mdk3
- Android 5+ version (rooted)
- Busybox
Features
- View a list of access points and stations (clients) around you (even hidden ones)
- View the activity of a network (by measuring beacons and data packets) and its clients
- Deauthenticate all the clients of a network
- Deauthenticate a specific client from the network it’s connected
- MDK3 Beacon Flooding with custom SSID list
- MDK3 Authentication DoS for a specific network or to everyone
- Try to get a WPA handshake or gather IVs to crack a WEP network
- Statistics about access points (only encryption for now)
- See the manufacturer of a device (AP or station) from a OUI database (pulled from IEEE)
- See the signal power of devices and filter the ones that are closer to you
- Leave the app running in the background, optionally with a notification
- Copy commands or MAC addresses to clipboard, so you can run them in a terminal if something goes wrong
- Include the tools
- Reaver WPS cracking (pixie-dust attack using NetHunter chroot and external adapter)
- .cap files cracking with custom wordlist
- Save captured packets in .cap file
- Create custom commands to be ran on an access point or a client with one click