cleaning up readme

This commit is contained in:
anoduck 2023-10-25 09:24:22 -04:00
parent 39137e6794
commit 18ace41ad4
2 changed files with 11 additions and 15 deletions

View file

@ -133,15 +133,16 @@ sudo $(which poetry) run python3 ctiger.py -h
░█▄▄█ ▀─▀▀ ▀▀▀▀ ─▀▀▀ ▀▀▀ ▀──▀ ▀▀▀ ▀──▀ ▀▀▀▀ ─░█── ▀▀▀ ▀▀▀▀ ▀▀▀ ▀─▀▀
usage: ctiger.py -i $IFACE (-t $TARGET or -f $TARGET_FILE)
Background scanning of wifi clients and APs, with a trigger.
Performs various actions on wifi targets.
This program reads from a list of preselected targets, then runs in the background
and scans if those targets are available. If so, a command is executed.
This program was created with the intent to allow users to attack
wifi targetsthat are only available some of the time, and extract
information from them.
There are three types of actions that can be performed:
2. ATTACK [att] = Will run a scan in the background looking for aps in target list.
If found will begin capturing a pcap file and deauth attack.
If found will begin capturing a pcap file and deauth attack.
3. Mac_Purge [mac] = Experimental: Scans for wireless devices and acquires their MAC
addresses. Then transmits a Clear to Send Frame. If the device responds with
@ -151,9 +152,6 @@ If found will begin capturing a pcap file and deauth attack.
This action only scans for the target(s) provided and writes results to a csv file
This file can later be used with the attack command.
The script was created with the intent to allow users to attack wifi targets
that are only available some of the time.
options:
-h, --help show this help message and exit
-v, --version show program's version number and exit

View file

@ -806,25 +806,23 @@ else:
prog=prog,
formatter_class=argparse.RawTextHelpFormatter,
usage='%(prog)s -i $IFACE (-t $TARGET or -f $TARGET_FILE)',
description='Background scanning of wifi clients and APs, with a trigger.\n'
description='Performs various actions on wifi targets.\n'
'\n'
'This program reads from a list of preselected targets, then runs in the background\n'
'and scans if those targets are available. If so, a command is executed.\n'
'This program was created with the intent to allow users to attack\n'
'wifi targetsthat are only available some of the time, and extract\n'
'information from them.\n'
'\n'
'There are three types of actions that can be performed:\n'
'\n'
'2. ATTACK [att] = Will run a scan in the background looking for aps in target list.\n'
'If found will begin capturing a pcap file and deauth attack.\n'
' If found will begin capturing a pcap file and deauth attack.\n'
'\n'
'3. Mac_Purge [mac] = Experimental: Scans for wireless devices and acquires their MAC\n' ' addresses. Then transmits a Clear to Send Frame. If the device responds with \n'
' data frame, then information on the device will be stored and written to file.\n'
'\n'
'4. SCAN [scn] = Scan for target\n'
' This action only scans for the target(s) provided and writes results to a csv file\n'
' This file can later be used with the attack command.\n'
'\n'
'The script was created with the intent to allow users to attack wifi targets\n'
'that are only available some of the time.\n',
' This file can later be used with the attack command.\n',
epilog='Processing will take several seconds, please be patient.\n',
conflict_handler='resolve')
# options parser