cleaning up readme
This commit is contained in:
parent
39137e6794
commit
18ace41ad4
2 changed files with 11 additions and 15 deletions
12
README.md
12
README.md
|
@ -133,15 +133,16 @@ sudo $(which poetry) run python3 ctiger.py -h
|
|||
░█▄▄█ ▀─▀▀ ▀▀▀▀ ─▀▀▀ ▀▀▀ ▀──▀ ▀▀▀ ▀──▀ ▀▀▀▀ ─░█── ▀▀▀ ▀▀▀▀ ▀▀▀ ▀─▀▀
|
||||
usage: ctiger.py -i $IFACE (-t $TARGET or -f $TARGET_FILE)
|
||||
|
||||
Background scanning of wifi clients and APs, with a trigger.
|
||||
Performs various actions on wifi targets.
|
||||
|
||||
This program reads from a list of preselected targets, then runs in the background
|
||||
and scans if those targets are available. If so, a command is executed.
|
||||
This program was created with the intent to allow users to attack
|
||||
wifi targetsthat are only available some of the time, and extract
|
||||
information from them.
|
||||
|
||||
There are three types of actions that can be performed:
|
||||
|
||||
2. ATTACK [att] = Will run a scan in the background looking for aps in target list.
|
||||
If found will begin capturing a pcap file and deauth attack.
|
||||
If found will begin capturing a pcap file and deauth attack.
|
||||
|
||||
3. Mac_Purge [mac] = Experimental: Scans for wireless devices and acquires their MAC
|
||||
addresses. Then transmits a Clear to Send Frame. If the device responds with
|
||||
|
@ -151,9 +152,6 @@ If found will begin capturing a pcap file and deauth attack.
|
|||
This action only scans for the target(s) provided and writes results to a csv file
|
||||
This file can later be used with the attack command.
|
||||
|
||||
The script was created with the intent to allow users to attack wifi targets
|
||||
that are only available some of the time.
|
||||
|
||||
options:
|
||||
-h, --help show this help message and exit
|
||||
-v, --version show program's version number and exit
|
||||
|
|
14
ctiger.py
14
ctiger.py
|
@ -806,25 +806,23 @@ else:
|
|||
prog=prog,
|
||||
formatter_class=argparse.RawTextHelpFormatter,
|
||||
usage='%(prog)s -i $IFACE (-t $TARGET or -f $TARGET_FILE)',
|
||||
description='Background scanning of wifi clients and APs, with a trigger.\n'
|
||||
description='Performs various actions on wifi targets.\n'
|
||||
'\n'
|
||||
'This program reads from a list of preselected targets, then runs in the background\n'
|
||||
'and scans if those targets are available. If so, a command is executed.\n'
|
||||
'This program was created with the intent to allow users to attack\n'
|
||||
'wifi targetsthat are only available some of the time, and extract\n'
|
||||
'information from them.\n'
|
||||
'\n'
|
||||
'There are three types of actions that can be performed:\n'
|
||||
'\n'
|
||||
'2. ATTACK [att] = Will run a scan in the background looking for aps in target list.\n'
|
||||
'If found will begin capturing a pcap file and deauth attack.\n'
|
||||
' If found will begin capturing a pcap file and deauth attack.\n'
|
||||
'\n'
|
||||
'3. Mac_Purge [mac] = Experimental: Scans for wireless devices and acquires their MAC\n' ' addresses. Then transmits a Clear to Send Frame. If the device responds with \n'
|
||||
' data frame, then information on the device will be stored and written to file.\n'
|
||||
'\n'
|
||||
'4. SCAN [scn] = Scan for target\n'
|
||||
' This action only scans for the target(s) provided and writes results to a csv file\n'
|
||||
' This file can later be used with the attack command.\n'
|
||||
'\n'
|
||||
'The script was created with the intent to allow users to attack wifi targets\n'
|
||||
'that are only available some of the time.\n',
|
||||
' This file can later be used with the attack command.\n',
|
||||
epilog='Processing will take several seconds, please be patient.\n',
|
||||
conflict_handler='resolve')
|
||||
# options parser
|
||||
|
|
Loading…
Reference in a new issue