Using Python to easily deauth devices on a network.
A brief note in regards to legality. I've decided that before announcing to future universities and the general public of how great a criminal I am, it would be relatively smart to show that at least a small amount of research has been done into the laws regarding your right to the internet. The right that this script enables the effective and easy removal of. Fortunately for my (as of yet) clean criminal record, everything I've done both in and out of this blog will have been performed with the explicit consent from the targeted party. I'm then also going to publicly acknowledge that the sharing of the scripts code falls under "educational reasons", or perhaps "penetration testing purposes". All I'm saying is that if Offensive Security can get away with it, why can't I. The script in question The script I've written is designed to provide an easy user interface for performing de-authentication attacks against known devices. For those who...