Project Information
Featured
|
Wifite v2 is now availableWhat's new in this version:
Version 2 does not include a GUI, so everything must be done at the command-line. mention in the New York TimesWifite was mentioned in the New York Times' article "New Hacking Tools Pose Bigger Threats to Wi-Fi Users" from February 16, 2011. Here is a link to the article. introductionDesigned and tested on Linux; works with Backtrack 5, BlackBuntu, BackBox, and Pentoo! Linux only; no windows or OSX support (but you're welcome to try). purposeTo attack multiple WEP, WPA, and WPS encrypted networks in a row. This tool is customizable to be automated with only a few arguments. Wifite aims to be the "set it and forget it" wireless auditing tool. features
requirements
suggested applications
For help installing any of these programs, see the installation guide (hosted on github) executiondownload the latest version: wget -O wifite.py http://wifite.googlecode.com/svn/trunk/wifite.py change permissions to executable: chmod +x wifite.py execute: python wifite.py or, to see a list of commands with info: ./wifite.py -help screenshotssuccessful WEP attack (after 90 seconds):
successful WPS attacks (after 17 hours):
video tutorial(tutorial is for v1 of wifite. new videos coming soon) capturing WPA handshake using Wifite (and then cracking with oclHashCat).
video credit: Maurizio Schmidt examplesthe program contains lots of interactivity (waits for user input). these command-line options are meant to make the program 100% automated -- no supervision required. to crack all WEP access points: ./wifite.py -all -wep to crack all WPS access points with signal strength greater than (or equal to) 50dB: ./wifite.py -p 50 -wps to attack all access points, use 'darkc0de.lst' for cracking WPA handshakes: ./wifite.py -all --dict /pentest/passwords/wordlists/darkc0de.lst to attack all WPA access points, but do not try to crack -- any captured handshakes are saved automatically: ./wifite.py -all -wpa --dict none to crack all WEP access points greater than 50dB in strength, giving 5 minutes for each WEP attack method, and send packets at 600 packets/sec: ./wifite.py --pow 50 -wept 300 -pps 600 to attempt to crack WEP-encrypted access point "2WIRE752" endlessly -- program will not stop until key is cracked or user interrrupts with ctrl+C): ./wifite.py -e "2WIRE752" -wept 0 donationsIf you wish to donate to this project, I ask that you donate instead to the aircrack-ng team or you could buy something from Tactical Network Solutions. These are the teams which produced the awesome open-source software that wifite depends on. Wifite would not exist if not for these amazing tools. |