Tool Documentation:
wifite Usage Example
Attack access points with over 50 dB of power (-pow 50
) using the WPS attack (-wps
):
root@kali:~# wifite -pow 50 -wps
.;' `;,
.;' ,;' `;, `;, WiFite v2 (r85)
.;' ,;' ,;' `;, `;, `;,
:: :: : ( ) : :: :: automated wireless auditor
':. ':. ':. /_\ ,:' ,:' ,:'
':. ':. /___\ ,:' ,:' designed for Linux
':. /_____\ ,:'
/ \
[+] targeting WPS-enabled networks
[+] scanning for wireless devices...
[+] enabling monitor mode on wlan0... done
[+] initializing scan (mon0), updates at 5 sec intervals, CTRL+C when ready.
Packages and Binaries:
wifite
Wifite is a tool to audit WEP or WPA encrypted wireless networks. It uses aircrack-ng, pyrit, reaver, tshark tools to perform the audit.
This tool is customizable to be automated with only a few arguments and can be trusted to run without supervision.
Installed size: 2.35 MB
How to install: sudo apt install wifite
Dependencies:
- aircrack-ng
- ieee-data
- net-tools
- python3
- python3
- python3-chardet
- python3-scapy
- reaver
- tshark
wifite
Python script to automate wireless auditing using aircrack-ng tools
root@kali:~# wifite -h
. .
.´ · . . · `. wifite2 2.7.0
: : : (¯) : : : a wireless auditor by derv82
`. · ` /¯\ ´ · .´ maintained by kimocoder
` /¯¯¯\ ´ https://github.com/kimocoder/wifite2
options:
-h, --help show this help message and exit
SETTINGS:
-v, --verbose Shows more options (-h -v). Prints commands and outputs. (default:
quiet)
-i [interface] Wireless interface to use, e.g. wlan0mon (default: ask)
-c [channel] Wireless channel to scan e.g. 1,3-6 (default: all 2Ghz channels)
-inf, --infinite Enable infinite attack mode. Modify scanning time with -p (default:
off)
-mac, --random-mac Randomize wireless card MAC address (default: off)
-p [scan_time] Pillage: Attack all targets after scan_time (seconds)
--kill Kill processes that conflict with Airmon/Airodump (default: off)
-pow [min_power], --power [min_power] Attacks any targets with at least min_power signal strength
--skip-crack Skip cracking captured handshakes/pmkid (default: off)
-first [attack_max], --first [attack_max] Attacks the first attack_max targets
-ic, --ignore-cracked Hides previously-cracked targets. (default: off)
--clients-only Only show targets that have associated clients (default: off)
--nodeauths Passive mode: Never deauthenticates clients (default: deauth targets)
--daemon Puts device back in managed mode after quitting (default: off)
WEP:
--wep Show only WEP-encrypted networks
--require-fakeauth Fails attacks if fake-auth fails (default: off)
--keep-ivs Retain .IVS files and reuse when cracking (default: off)
WPA:
--wpa Show only WPA-encrypted networks (includes WPS)
--new-hs Captures new handshakes, ignores existing handshakes in hs (default:
off)
--dict [file] File containing passwords for cracking (default: /usr/share/dict/wordlist-
probable.txt)
WPS:
--wps Show only WPS-enabled networks
--wps-only Only use WPS PIN & Pixie-Dust attacks (default:
off)
--bully Use bully program for WPS PIN & Pixie-Dust attacks (default:
reaver)
--reaver Use reaver program for WPS PIN & Pixie-Dust attacks (default:
reaver)
--ignore-locks Do not stop WPS PIN attack if AP becomes locked (default:
stop)
PMKID:
--pmkid Only use PMKID capture, avoids other WPS & WPA attacks (default:
off)
--no-pmkid Don't use PMKID capture (default: off)
--pmkid-timeout [sec] Time to wait for PMKID capture (default: 300 seconds)
COMMANDS:
--cracked Print previously-cracked access points
--check [file] Check a .cap file (or all hs/*.cap files) for WPA handshakes
--crack Show commands to crack a captured handshake
Updated on: 2024-Nov-17