eth0

Disconnected CAP IDS MITM DNS WIDS WiFi:0 BLE:0
eth0 AI console. Connect to COM port, configure API key, then chat or use context buttons.
0 alerts
-
Captured
-
Sent
-
TCP
-
UDP
-
ARP
-
ICMP

Capture

MitM (ARP Poison)

DNS Spoof

Modules

WPA Handshake Capture + Crack

Captures WPA/WPA2 4-way handshakes and PMKIDs in promiscuous mode, exports hashcat 22000, or cracks on-device with PBKDF2-HMAC-SHA1 (HW-accelerated, ~50–200 pw/s — small dictionaries only).
No captures yet.
Idle

Attack Mode (Playbook Orchestrator)

Chains real attacks: credgrab=MitM+DNS+LLMNR | blackhole=MitM+DNS→0.0.0.0+RST | dhcpx=DHCP-flood+LLMNR | killchain=auto sweep→MitM→DNS→RST
Inactive

Wireless

WIDS (Wireless Attack Detector)

Disabled

Recon

Active Blocking

Honeypot (Ethernet)

MITRE ATT&CK TTPs

Network Discovery

Port Scan / Service Scan

Wireless

Network Map / Info

Connect to device and run ARP sweep to discover hosts
0 rules
SD Card Files
0 packets
TimeProtoInfoLen