# Wireless Cracker

## Getting Started:

To get started using the wireless cracker module select the attack you wish to execute.&#x20;

![](/files/-MXcg2B_Ib3w0z6Zq_0o)

## Interfaces:&#x20;

![](/files/-MXchT3baODVhWGgjfFT)

Depending on the interface you plan to use for the attack in my case `wlan0` and `wlan1` were my options to use.  Usually those are the most common interfaces to use and choose from when running any of these attacks in the module.&#x20;

## Types of Attacks:

* `WPS Attack` -  The attack works by executing a brute-force attack against the WPS PIN.
* `WPA/WPA2 Attack` - Creates a `.cap` file for the user to read with a specific BSSID.&#x20;
* `CAP Bruteforce` - The attack works by executing a brute-force attack against all possible passcodes using a massive wordlist that is provided in the download. However, you can customize the wordlist to make it other wordlists while trying to crack the network.

##


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.aafi.xyz/command-modules/wireless-cracker.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
