Tool and Usage
Why this tool?
Trackerjacker is a security tool to map WiFi networks that you are not connected to. It allows mapping and tracking of devices using the 802.11 protocol. It may be useful for intelligence gathering or performing specific WiFi attacks, such as a deauthentication attack. The tool comes with plugin support so that it can interact with other tools. For example, when a particular event occurs it can be picked up by another tool.
How it works
Trackerjacker uses the Scapy library to listen to network traffic (802.11). Root permissions are needed to allow the tool receiving all data on an interface.
When running the tool in map mode (monitoring), any observed data is stored in a YAML file named wifi_map.yaml. If the tool is used to track, then a threshold can be specified to take an action. This threshold is the number of bytes. For example, a device sending a burst of data can be tracked or possibly even attacked.
Usage and audience
trackerjacker is commonly used for network scanning, network spoofing, network traffic analysis, or penetration testing. Target users for this tool are pentesters and security professionals.
- YAML output supported
Example usage and output
Tool review and remarks
The review and analysis of this project resulted in the following remarks for this security tool:
- + The source code of this software is available
- - Requires root permissions
History and highlights
- Demo at DEF CON 26 Demo Labs
Supported operating systems
Trackerjacker is known to work on Linux and macOS.
Several dependencies are required to use trackerjacker.
Similar tools to trackerjacker:
BoopSuite a wireless pentesting suite to perform security auditing and test wireless networks. It can be used for penetration tests and security assignments.
Aircrack-ng is a security toolkit to perform WiFi auditing. It can be useful for security assessments to test the security of the wireless network.
Airgeddon is a toolkit to perform security assessments of wireless networks. It can perform different types of wireless attacks.
This tool page was updated at . Found an improvement? Help the community by submitting an update.