A complete re-write of wifite, a Python script for auditing wireless networks.
Wifite runs existing wireless-auditing tools for you. Stop memorizing command arguments & switches!
wifite
was bad about this).--verbose
option (expandable to -vv
or -vvv
) shows which commands are executed & the output of those commands.Also Read BurpBounty – Active and Passive Scan Check Builder
--wept
, --wpst
, and other confusing switches). ./Wifite.py -h -v
-bully
) Pixie-Dust attack (enabled by-default, force with: --wps-only
)--no-wps
)pyrit
, tshark
, cowpatty
, and aircrack-ng
(when available)-c <channel>
switch.--no-deauths
switch-5
switch). aireplay-ng
)--cracked
) --crack
) aircrack-ng
, john
, hashcat
, or pyrit
.Only the latest versions of these programs are supported:
Required:
iwconfig
: For identifying wireless devices already in Monitor Mode.ifconfig
: For starting/stopping wireless devices.Aircrack-ng
suite, includes: aircrack-ng
: For cracking WEP .cap files and and WPA handshake captures.aireplay-ng
: For deauthing access points, replaying capture files, various WEP attacks.airmon-ng
: For enumerating and enabling Monitor Mode on wireless devices.airodump-ng
: For target scanning & capture file generation.packetforge-ng
: For forging capture files.Optional, but Recommended:
tshark
: For detecting WPS networks and inspecting handshake capture files.reaver
: For WPS Pixie-Dust attacks. wash
tool can be used to detect WPS networks if tshark
is not found.bully
: For WPS Pixie-Dust attacks. --bully
to use Bully instead of Reaver.reaver
cannot after cracking WPS PIN.cowpatty
: For detecting handshake captures.pyrit
: For detecting handshake captures.git clone https://github.com/derv82/wifite2.git
cd wifite2
./Wifite.py
Docker is a powerful open-source containerization platform that allows developers to build, test, and deploy…
Docker is one of the most widely used containerization platforms. But there may come a…
Introduction Google Dorking is a technique where advanced search operators are used to uncover information…
Introduction In cybersecurity and IT operations, logging fundamentals form the backbone of monitoring, forensics, and…
What is Networking? Networking brings together devices like computers, servers, routers, and switches so they…
Introduction In the world of Open Source Intelligence (OSINT), anonymity and operational security (OPSEC) are…