Tactical Control Center data

Network Injector data tab

Data is described below:

Data Description
Network interface

List of connected network interfaces. Select the injection interface connected to the network on which the device to be attacked is connected.

When simulating an Access Point, the interface used in the Fake Access Point section also appears.

Sniffing interface

Like Network Interface or another network interface to only be used for sniffing.

Regular expression

Expression used to filter devices connected to the network. It is applied to all data transmitted and received by the device via network, of any kind.

See "What you should know about Tactical Control Center" .

BPF network filter

This is used to more accurately filter devices using BPF syntax (Berkeley Packet Filter). This syntax includes key words accompanied by qualifiers:

See "What you should know about Tactical Control Center" .

Found device data

Data is described below:

Data Description
Status

Connected network device status:

: unknown device. It cannot be infected due to problems tied to authentication. Forcing authentication.

: device being identified.

: device identified and can be infected.

Filter : device that meets filter criteria.
Attack

: infected device.

HW address Device network card hardware address.
IP address Device's network IP address.
Vendor Network card brand (rather reliable).
Hostname Device name.
Wireless Intruder data tab

Data is described below:

Data Description
Wireless interface List of non connected network interfaces. Select the interface to connect to the protected WiFi network to be opened.
ESSID network Name of the local network to be opened.
Attack type

Types of available password identification.

Type Description
WPA/WPA2 dictionary attack

Collects handshakes between the client and access point and tries to discover the password using a dictionary of common words.

WEP bruteforce attack

injects simulating a connected client to collect data and force the encrypted password.

WPS PIN bruteforce attack

Tries all the possible combinations to recover the access point settings using WiFi Protected Setup protocol.

Fake Access Point data tab

Data is described below:

Data Description
Wireless interface

List of non connected network interfaces. Select the interface to be displayed as the WiFi network.

HW address Device network card hardware address.
Access point Name of the Access Point expected by the device.