Wacker is a set of scripts designed to perform online dictionary attacks against WPA3 access points by leveraging the wpa_supplicant control interface. By interacting directly with the supplicant daemon, the tool gains status information and event notifications that significantly speed up the authentication cycle during brute-force attempts. This is particularly effective against the Simultaneous Authentication of Equals (SAE) protocol where traditional offline cracking may be restricted.
Key Features
- Uses the wpa_supplicant control interface to bypass manual connection overhead and accelerate authentication.
- Supports parallelization of cracking efforts across multiple wireless interfaces using wordlist partitioning.
- Disables background scanning to ensure the wireless radio remains focused on authentication attempts.
- Includes a dedicated wordlist splitter for distributed cracking operations.
- Provides verbose debugging and logging via Unix Domain Sockets for fine-grained session monitoring.
Use Cases
- Executing online brute-force attacks against WPA3-Personal (SAE) networks during wireless security assessments.
- Auditing the resilience of modern wireless infrastructure against high-frequency authentication attempts.
- Validating WPA3 password complexity in environments where offline handshake capture is unfeasible.




