Linux Command Library


Python script to automate wireless auditing using aircrack-ng tools


Wifite is a tool to audit WEP or WPA encrypted wireless networks. It uses aircrack-ng, pyrit, reaver, tshark tools to perform the audit.

This tool is customizable to be automated with only a few arguments and can be trusted to run without supervision.

-check <file>check capfile <file> for handshakes. -crackeddisplay previously-cracked access points

-allattack all targets. [off] -i <iface> wireless interface for capturing [auto] -macChanges MAC address of 'iface' to a random MAC. [off] -c <channel>channel to scan for targets [auto] -e <essid>target a specific access point by ssid (name) [ask] -b <bssid>target a specific access point by bssid (mac) [auto] -showbdisplay target BSSIDs after scan [off] -pow <db>attacks any targets with signal strenghth > db [0] -q -quietdo not print list of APs during scan [off]

-wpaonly target WPA networks (works with -wps -wep) [off] -wpat <sec>time to wait for WPA attack to complete (seconds) [500] -wpadt <sec>time to wait between sending deauth packets (sec) [10] -stripstrip handshake using tshark or pyrit [off] -crack <dic>crack WPA handshakes using <dic> wordlist file [off] -dict <file>specify dictionary to use when cracking WPA [phpbb.txt] -aircrackverify handshake using aircrack [on] -pyritverify handshake using pyrit [off] -tsharkverify handshake using tshark [on]

-weponly target WEP networks [off] -pps <num>set the number of packets per second to inject [600] -wept <sec>sec to wait for each attack, 0 implies endless [600] -chopchopuse chopchop attack [on] -arpreplayuse arpreplay attack [on] -fragmentuse fragmentation attack [on] -caffelatteuse caffe-latte attack [on] -p0841use -p0841 attack [on] -hirteuse hirte (cfrag) attack [on] -nofakeauthstop attack if fake authentication fails [off] -wepca <n>start cracking when number of ivs surpass n [10000] -wepsavesave a copy of .cap files to this directory [off]

-wpsonly target WPS networks [off] -wpst -wpstime <sec>max wait for new retry before giving up (0: never) [660] -wpsratio -wpsr <per>min ratio of successful PIN attempts/total tries [0] -wpsretry -wpsmaxr <num>max number of retries for same PIN before giving up [0]

-upgradeChecks for new version -updateChecks for new version

./ -wps -wep -c 6 -pps 600

Dave M (

This manual page was written by Daniel Echeverry <>, for the Debian project (and may be used by others).

play store download app store download
Sonnenallee 29, 12047 Berlin, Germany

Privacy policy
Successfully copied