A complete re-write of wifite, a Python script for auditing wireless networks.
Wifite runs existing wireless-auditing tools for you. Stop memorizing command arguments & switches!
wifite was bad about this).--verbose option (expandable to -vv or -vvv) shows which commands are executed & the output of those commands.Also Read BurpBounty – Active and Passive Scan Check Builder
--wept, --wpst, and other confusing switches). ./Wifite.py -h -v-bully) Pixie-Dust attack (enabled by-default, force with: --wps-only)--no-wps)pyrit, tshark, cowpatty, and aircrack-ng (when available)-c <channel> switch.--no-deauths switch-5 switch). aireplay-ng)--cracked) --crack) aircrack-ng, john, hashcat, or pyrit.Only the latest versions of these programs are supported:
Required:
iwconfig: For identifying wireless devices already in Monitor Mode.ifconfig: For starting/stopping wireless devices.Aircrack-ng suite, includes: aircrack-ng: For cracking WEP .cap files and and WPA handshake captures.aireplay-ng: For deauthing access points, replaying capture files, various WEP attacks.airmon-ng: For enumerating and enabling Monitor Mode on wireless devices.airodump-ng: For target scanning & capture file generation.packetforge-ng: For forging capture files.Optional, but Recommended:
tshark: For detecting WPS networks and inspecting handshake capture files.reaver: For WPS Pixie-Dust attacks. wash tool can be used to detect WPS networks if tshark is not found.bully: For WPS Pixie-Dust attacks. --bully to use Bully instead of Reaver.reaver cannot after cracking WPS PIN.cowpatty: For detecting handshake captures.pyrit: For detecting handshake captures.git clone https://github.com/derv82/wifite2.git
cd wifite2
./Wifite.py General Working of a Web Application Firewall (WAF) A Web Application Firewall (WAF) acts as…
How to Send POST Requests Using curl in Linux If you work with APIs, servers,…
If you are a Linux user, you have probably seen commands like chmod 777 while…
Vim and Vi are among the most powerful text editors in the Linux world. They…
Working with compressed files is a common task for any Linux user. Whether you are…
In the digital era, an email address can reveal much more than just a contact…