diff --git a/README.md b/README.md index c0e39fac..aff12c2a 100644 --- a/README.md +++ b/README.md @@ -4,25 +4,6 @@ Patreon: [Pwnagotchi-Torch](https://www.patreon.com/pwnagotchi_torch) -If you are using a Pi Zero 2W run the following commands through SSH. - -```BATCH -sudo systemctl enable dphys-swapfile.service -sudo nano /etc/dphys-swapfile # edit 100 -> 2048 -sudo reboot now -``` - - -Flash version 2.3.7 then run these commands to get the latest version released. Now 2.4.2! -```BATCH -cd /usr/local/src -sudo rm -r pwnagotchi/ -sudo git clone -b v2.4.2 https://github.com/jayofelony/pwnagotchi.git -cd pwnagotchi/ -sudo pip3 install . -sudo reboot now -``` - --- [Pwnagotchi](https://pwnagotchi.ai/) is an [A2C](https://hackernoon.com/intuitive-rl-intro-to-advantage-actor-critic-a2c-4ff545978752)-based "AI" leveraging [bettercap](https://www.bettercap.org/) that learns from its surrounding WiFi environment to maximize the crackable WPA key material it captures (either passively, or by performing authentication and association attacks). This material is collected as PCAP files containing any form of handshake supported by [hashcat](https://hashcat.net/hashcat/), including [PMKIDs](https://www.evilsocket.net/2019/02/13/Pwning-WiFi-networks-with-bettercap-and-the-PMKID-client-less-attack/),