Easy to try to crack handshakes or PMKID hashes against a wordlist ( -crack)Ĭomparing this repo to the "old wifite".Includes information about the cracked access point (Name, BSSID, Date, etc).Stores cracked passwords and handshakes to the current directory ( -cracked).Note: Some tools don't play well on 5GHz channels (e.g.5Ghz support for some wireless cards (via -5 switch).Note: Only works when channel is fixed.Automatically decloaks hidden access points while scanning or attacking.Various WEP attacks (replay, chopchop, fragment, hirte, p0841, caffe-latte).Validates handshakes against pyrit, tshark, cowpatty, and aircrack-ng (when available). WPA/2 Offline Brute-Force Attack via 4-Way Handshake capture (enabled by-default, force with: -no-wps).(enabled by-default, force with: -wps-only -no-pixie) WPS Online Brute-Force Attack aka "PIN attack".(enabled by-default, force with: -wps-only -pixie) WPS Offline Brute-Force Attack aka "Pixie-Dust".PMKID hash capture (enabled by-default, force with: -pmkid).Sudo python setup.py install -record files.txt \ hcxpcaptool: For converting PMKID packet captures into hashcat's format.hcxdumptool: For capturing PMKID hashes.pyrit: For detecting handshake captures.coWPAtty: For detecting handshake captures.Bully is also used to fetch PSK if reaver cannot after cracking WPS PIN.Specify -bully to use Bully instead of Reaver. bully: For WPS Pixie-Dust & brute-force attacks.Note: Reaver's wash tool can be used to detect WPS networks if tshark is not found.reaver: For WPS Pixie-Dust & brute-force attacks.tshark: For detecting WPS networks and inspecting handshake capture files.packetforge-ng: For forging capture files.airodump-ng: For target scanning & capture file generation.aireplay-ng: For deauthing access points, replaying capture files, various WEP attacks.airmon-ng: For enumerating and enabling Monitor Mode on wireless devices.ifconfig: For starting/stopping wireless devices.iwconfig: For identifying wireless devices already in Monitor Mode.python: Wifite is compatible with both python2 and python3.Second, only the latest versions of these programs are supported and must be installed for Wifite to work properly: There are many cheap wireless cards that plug into USB available from online stores. Required Toolsįirst and foremost, you will need a wireless card capable of "Monitor Mode" and packet injection (see this tutorial for checking if your wireless card is compatible and also this guide). Do not expect support unless you are using the latest versions of the Required Tools, and also patched wireless drivers that support injection. Other pen-testing distributions (such as BackBox or Ubuntu) have outdated versions of the tools used by Wifite. Wifite is designed specifically for the latest version of Kali Linux. Run wifite, select your targets, and Wifite will automatically start trying to capture or crack the password.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |