devices discovery, services enumeration, perform deauthentication attacks and etc. Modules are introduced to add more functionalities to complement the attack.
The syntax of modules basically follows the structure of the
metasploit modules.| commands | descriptions |
|---|---|
| set | set options for module |
| back | go back one level |
| help | show avaliable commands |
| options | show options of current module |
| run | execute module |