diff --git a/docs/about.md b/docs/about.md index 2883206..4777c21 100644 --- a/docs/about.md +++ b/docs/about.md @@ -33,7 +33,7 @@ So...what's the catch? Well, these four packets can easily be "sniffed" by an at In order to ~~eat~~ collect as many of these crackable handshake packets as possible, Pwnagotchi uses two strategies: -- **Deauthenticating the client stations it detects.** A deauthenticated device must reauthenticate to its access point by resending the 4-Way Handshake, thereby giving Pwnagotchi another chance to sniff the handshake packets and collect more crackable material. +- **Deauthenticating the client stations it detects.** A deauthenticated device must reauthenticate to its access point by re-performing the 4-Way Handshake with the AP, thereby giving Pwnagotchi another chance to sniff the handshake packets and collect more crackable material. - **Send association frames directly to the access points themselves** to try to force them to [leak the PMKID](https://www.evilsocket.net/2019/02/13/Pwning-WiFi-networks-with-bettercap-and-the-PMKID-client-less-attack/). diff --git a/docs/hacks.md b/docs/hacks.md index 5e47d51..6f58c3f 100644 --- a/docs/hacks.md +++ b/docs/hacks.md @@ -95,7 +95,7 @@ sudo bt-network -a hci0 -s nap pan0 & - Shutdown mobile data. - Connect to the newly available Bluetooth device (which has the name of your Pwnagotchi). - Once connected, you can test: `http://172.26.0.1:8080` -- You can also install bettercap's UI (`sudo buttercap` then `ui.update`) +- You can also install bettercap's UI (`sudo bettercap` then `ui.update`) - You'll need to change the http caplets to change `127.0.0.1` to `0.0.0.0`. - You can connect to the shell with a terminal emulator ...