A complete re-write of wifite, a Python script for auditing wireless networks.
Wifite runs existing wireless-auditing tools for you. Stop memorizing command arguments & switches!
wifite was bad about this).--verbose option (expandable to -vv or -vvv) shows which commands are executed & the output of those commands.Also Read BurpBounty – Active and Passive Scan Check Builder
--wept, --wpst, and other confusing switches). ./Wifite.py -h -v-bully) Pixie-Dust attack (enabled by-default, force with: --wps-only)--no-wps)pyrit, tshark, cowpatty, and aircrack-ng (when available)-c <channel> switch.--no-deauths switch-5 switch). aireplay-ng)--cracked) --crack) aircrack-ng, john, hashcat, or pyrit.Only the latest versions of these programs are supported:
Required:
iwconfig: For identifying wireless devices already in Monitor Mode.ifconfig: For starting/stopping wireless devices.Aircrack-ng suite, includes: aircrack-ng: For cracking WEP .cap files and and WPA handshake captures.aireplay-ng: For deauthing access points, replaying capture files, various WEP attacks.airmon-ng: For enumerating and enabling Monitor Mode on wireless devices.airodump-ng: For target scanning & capture file generation.packetforge-ng: For forging capture files.Optional, but Recommended:
tshark: For detecting WPS networks and inspecting handshake capture files.reaver: For WPS Pixie-Dust attacks. wash tool can be used to detect WPS networks if tshark is not found.bully: For WPS Pixie-Dust attacks. --bully to use Bully instead of Reaver.reaver cannot after cracking WPS PIN.cowpatty: For detecting handshake captures.pyrit: For detecting handshake captures.git clone https://github.com/derv82/wifite2.git
cd wifite2
./Wifite.py Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…
A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…
How Does a Firewall Work Step by Step? What Is a Firewall and How Does…
People trying to securely connect to work are being tricked into doing the exact opposite.…
A newly disclosed Android vulnerability is making noise for a good reason. Researchers showed that…
In MySQL Server 5.5 and earlier versions, the MyISAM was the default storage engine. So,…