API Refrence¶
Command Line Arguments¶
-
-h
-
--help
Show this help message and exit
Hint
[sudo] RoboPhisher -h
[sudo] RoboPhisher --help
-
-jI
-
--jamminginterface
Manually choose an interface that supports monitor mode for deauthenticating the victims.
Hint
[sudo] RoboPhisher -jI wlan1
[sudo] RoboPhisher --jamminginterface wlan1
Warning
The same interface can not be used for both jamming interface and ap interface .
-
-aI
-
--apinterface
Manually choose an interface that supports AP mode for spawning an AP.
Hint
[sudo] RoboPhisher -aI wlan1
[sudo] RoboPhisher --apinterface wlan1
Warning
The same interface can not be used for both jamming interface and ap interface .
-
-nJ
-
--nojamming
Skip the deauthentication phase. When this option is used, only one wireless interface is required.
Hint
[sudo] RoboPhisher -nJ
[sudo] RoboPhisher -nojamming
-
-e
-
--essid
Enter the ESSID of the rogue access point you would like to create.
Hint
[sudo] RoboPhisher -e "FREE WIFI"
[sudo] RoboPhisher --essid "FREE WIFI"
Warning
This option will skip access point selection phase.
-
-p
-
--phishingscenario
Choose the phishing scenario to run.This option will skip the scenario selection phase.
Hint
[sudo] RoboPhisher -p firmware_upgrade
[sudo] RoboPhisher --phishingscenario firmware_upgrade
Note
The name of the phishing scenario you specify here must match the folder name of the phishing scenario not it’s actual name.
Warning
This option will skip phishing scenario selection phase. This option will also raise an error if the specified phishing scenario is not found.
-
-pk
-
--presharedkey
Add WPA/WPA2 protection on the rogue access point.
Hint
[sudo] RoboPhisher -pk s3cr3tp4ssw0rd
[sudo] RoboPhisher --presharedkey s3cr3tp4ssw0rd
-
--log-file
Enable logging information to a file.
Hint
[sudo] RoboPhisher --log-file
Warning
This argument will only keep the three most recent logs. This means that after the fifth execution with the logging option it will overwrite the oldest log.