Linux Command Library
commands
Commands
basic
Basic
tips
Tips

wifite

Python script to automate wireless auditing using aircrack-ng tools

wifite [SETTINGS] [FILTERS]

Wifite is a tool to audit WEP or WPA encrypted wireless networks. It uses aircrack-ng, pyrit, reaver, tshark tools to perform the audit.

This tool is customizable to be automated with only a few arguments and can be trusted to run without supervision.

-check <file>check capfile <file> for handshakes. -crackeddisplay previously-cracked access points

-allattack all targets. [off] -i <iface> wireless interface for capturing [auto] -macChanges MAC address of 'iface' to a random MAC. [off] -c <channel>channel to scan for targets [auto] -e <essid>target a specific access point by ssid (name) [ask] -b <bssid>target a specific access point by bssid (mac) [auto] -showbdisplay target BSSIDs after scan [off] -pow <db>attacks any targets with signal strenghth > db [0] -q -quietdo not print list of APs during scan [off]

-wpaonly target WPA networks (works with -wps -wep) [off] -wpat <sec>time to wait for WPA attack to complete (seconds) [500] -wpadt <sec>time to wait between sending deauth packets (sec) [10] -stripstrip handshake using tshark or pyrit [off] -crack <dic>crack WPA handshakes using <dic> wordlist file [off] -dict <file>specify dictionary to use when cracking WPA [phpbb.txt] -aircrackverify handshake using aircrack [on] -pyritverify handshake using pyrit [off] -tsharkverify handshake using tshark [on]

-weponly target WEP networks [off] -pps <num>set the number of packets per second to inject [600] -wept <sec>sec to wait for each attack, 0 implies endless [600] -chopchopuse chopchop attack [on] -arpreplayuse arpreplay attack [on] -fragmentuse fragmentation attack [on] -caffelatteuse caffe-latte attack [on] -p0841use -p0841 attack [on] -hirteuse hirte (cfrag) attack [on] -nofakeauthstop attack if fake authentication fails [off] -wepca <n>start cracking when number of ivs surpass n [10000] -wepsavesave a copy of .cap files to this directory [off]

-wpsonly target WPS networks [off] -wpst -wpstime <sec>max wait for new retry before giving up (0: never) [660] -wpsratio -wpsr <per>min ratio of successful PIN attempts/total tries [0] -wpsretry -wpsmaxr <num>max number of retries for same PIN before giving up [0]

-upgradeChecks for new version -updateChecks for new version

./wifite.py -wps -wep -c 6 -pps 600

Dave M (derv82@gmail.com)

This manual page was written by Daniel Echeverry <epsilon77@gmail.com>, for the Debian project (and may be used by others).

play store download app store download
Imprint
Sonnenallee 29, 12047 Berlin, Germany
e-mail: sschubert89@gmail.com

Privacy policy
Successfully copied