1,what wifite?

An automated wireless attack tool.



To download and execute wifite, run the commands below:

wget https://raw.github.com/derv82/wifite/master/wifite.py //下载
chmod +x wifite.py //添加执行权限
./wifite.py //运行

使用:CTRL+C之后,来选择NUM 编号来开始破解。

wifite –help

.;’                     `;,
.;’  ,;’             `;,  `;,   WiFite v2 (r85)
.;’  ,;’  ,;’     `;,  `;,  `;,
::   ::   :   ( )   :   ::   ::  automated wireless auditor
‘:.  ‘:.  ‘:. /_\ ,:’  ,:’  ,:’
‘:.  ‘:.    /___\    ,:’  ,:’   designed for Linux
‘:.       /_____\      ,:’
/       \

-check <file>    check capfile <file> for handshakes.
-cracked        display previously-cracked access points

-all             attack all targets.              [off]
-i <iface>      wireless interface for capturing [auto]
-mac             anonymize mac address            [off]
-c <channel>    channel to scan for targets      [auto]
-e <essid>      target a specific access point by ssid (name)  [ask]
-b <bssid>      target a specific access point by bssid (mac)  [auto]
-showb           display target BSSIDs after scan               [off]
-pow <db>       attacks any targets with signal strenghth > db [0]
-quiet           do not print list of APs during scan           [off]
-wpa            only target WPA networks (works with -wps -wep)   [off]
-wpat <sec>       time to wait for WPA attack to complete (seconds) [500]
-wpadt <sec>      time to wait between sending deauth packets (sec) [10]
-strip          strip handshake using tshark or pyrit             [off]
-crack <dic>    crack WPA handshakes using <dic> wordlist file    [off]
-dict <file>    specify dictionary to use when cracking WPA [phpbb.txt]
-aircrack       verify handshake using aircrack [on]
-pyrit          verify handshake using pyrit    [off]
-tshark         verify handshake using tshark   [on]
-cowpatty       verify handshake using cowpatty [off]

-wep            only target WEP networks [off]
-pps <num>      set the number of packets per second to inject [600]
-wept <sec>     sec to wait for each attack, 0 implies endless [600]
-chopchop       use chopchop attack      [on]
-arpreplay      use arpreplay attack     [on]
-fragment       use fragmentation attack [on]
-caffelatte     use caffe-latte attack   [on]
-p0841          use -p0841 attack        [on]
-hirte          use hirte (cfrag) attack [on]
-nofakeauth     stop attack if fake authentication fails    [off]
-wepca <n>      start cracking when number of ivs surpass n [10000]
-wepsave        save a copy of .cap files to this directory [off]

-wps           only target WPS networks         [off]
-wpst <sec>      max wait for new retry before giving up (0: never)  [660]
-wpsratio <per>    min ratio of successful PIN attempts/total tries    [0]
-wpsretry <num>    max number of retries for same PIN before giving up [0]

./wifite.py -wps -wep -c 6 -pps 600

Required Programs

Please see the installation guide on the wiki for help installing any of the tools below.

  • Python 2.7.x. Wifite is a Python script and requires Python to run.
  • aircrack-ng suite. This is absolutely required. The specific programs used in the suite are:
    • airmon-ng,
    • airodump-ng,
    • aireplay-ng,
    • packetforge-ng, and
    • aircrack-ng.
  • Standard linux programs.
    • iwconfig, ifconfig, which, iw

Suggested Programs

* indicates program is not included in Backtrack 5 R1

  • *reaver, a Wifi-Protected Setup (WPS) attack tool. Reaver includes a scanner “walsh” (or “wash”) for detecting WPS-enabled access points. Wifite uses Reaver to scan for and attack WPS-enabled routers.
  • *pyrit, a GPU cracker for WPA PSK keys. Wifite uses pyrit (if found) to detect handshakes. In the future, Wifite may include an option to crack WPA handshakes via pyrit.
  • tshark. Comes bundled with Wireshark, packet sniffing software.
  • cowpatty, a WPA PSK key cracker. Wifite uses cowpatty (if found) to detect handshakes