Some checks failed
Discord Push Notification / notify (push) Has been cancelled
Phase 1 of v0.4.0 offensive modules: - Promiscuous dispatcher (rt_promisc): shared IRAM callback multiplexer for stealth scan, karma, capture — solves single-callback ESP-IDF limit - Attack manager (rt_attack): mutual exclusion ensuring only one offensive operation runs at a time - Deauth refactored to use shared promisc dispatcher + attack lock - Stealth passive scan migrated to promisc dispatcher - Karma attack (rt_karma): probe request listener + probe response injection + rogue SoftAP with most-requested SSID + DNS responder - WPA handshake capture (rt_capture): EAPOL frame capture via promiscuous DATA filter, 4-way handshake identification, optional deauth burst to trigger reconnection - Kconfig: RT_BEACON, RT_KARMA, RT_CAPTURE toggle options - 5 new C2 commands: rt_karma, rt_karma_stop, rt_karma_clients, rt_capture, rt_capture_stop (14 total in mod_redteam)
37 lines
874 B
C
37 lines
874 B
C
/*
|
||
* rt_deauth.h
|
||
* 802.11 deauthentication frame injection.
|
||
*/
|
||
#pragma once
|
||
|
||
#include <stdbool.h>
|
||
#include <stdint.h>
|
||
|
||
#ifdef __cplusplus
|
||
extern "C" {
|
||
#endif
|
||
|
||
/*
|
||
* Start sending deauth frames.
|
||
* bssid – target AP BSSID (6 bytes)
|
||
* client – target client MAC, or NULL/broadcast for all clients
|
||
* channel – WiFi channel (1-13), 0 = auto-detect from scan
|
||
* count – number of frames to send, 0 = continuous until stop
|
||
* delay_ms – delay between bursts (default 10)
|
||
*/
|
||
void rt_deauth_start(const uint8_t bssid[6],
|
||
const uint8_t *client,
|
||
uint8_t channel,
|
||
uint32_t count,
|
||
uint32_t delay_ms);
|
||
|
||
/* Stop the deauth task. */
|
||
void rt_deauth_stop(void);
|
||
|
||
/* True if deauth task is running. */
|
||
bool rt_deauth_is_active(void);
|
||
|
||
#ifdef __cplusplus
|
||
}
|
||
#endif
|