wifite(1)

Python script to automate wireless auditing using aircrack-ng tools

Section 1 wifite bookworm source

Description

WIFITE

NAME

wifite - Python script to automate wireless auditing using aircrack-ng tools

SYNOPSIS

wifite [SETTINGS] [FILTERS]

DESCRIPTION

Wifite is a tool to audit WEP or WPA encrypted wireless networks. It uses aircrack-ng, pyrit, reaver, tshark tools to perform the audit.

This tool is customizable to be automated with only a few arguments and can be trusted to run without supervision.

COMMANDS

-check <file>

check capfile <file> for handshakes.
-cracked

display previously-cracked access points

GLOBAL

-all

attack all targets. [off]
-i <iface>

wireless interface for capturing [auto]
-mac

Changes MAC address of ’iface’ to a random MAC. [off]
-c <channel>

channel to scan for targets [auto]
-e <essid>

target a specific access point by ssid (name) [ask]
-b <bssid>

target a specific access point by bssid (mac) [auto]
-showb

display target BSSIDs after scan [off]
-pow <db>

attacks any targets with signal strenghth > db [0]
-q -quiet

do not print list of APs during scan [off]

WPA

-wpa

only target WPA networks (works with -wps -wep) [off]
-wpat <sec>

time to wait for WPA attack to complete (seconds) [500]
-wpadt <sec>

time to wait between sending deauth packets (sec) [10]
-strip

strip handshake using tshark or pyrit [off]
-crack <dic>

crack WPA handshakes using <dic> wordlist file [off]
-dict <file>

specify dictionary to use when cracking WPA [phpbb.txt]
-aircrack

verify handshake using aircrack [on]
-pyrit

verify handshake using pyrit [off]
-tshark

verify handshake using tshark [on]

WEP

-wep

only target WEP networks [off]
-pps <num>

set the number of packets per second to inject [600]
-wept <sec>

sec to wait for each attack, 0 implies endless [600]
-chopchop

use chopchop attack [on]
-arpreplay

use arpreplay attack [on]
-fragment

use fragmentation attack [on]
-caffelatte

use caffe-latte attack [on]
-p0841

use -p0841 attack [on]
-hirte

use hirte (cfrag) attack [on]
-nofakeauth

stop attack if fake authentication fails [off]
-wepca <n>

start cracking when number of ivs surpass n [10000]
-wepsave

save a copy of .cap files to this directory [off]

WPS

-wps

only target WPS networks [off]
-wpst -wpstime <sec>

max wait for new retry before giving up (0: never) [660]
-wpsratio -wpsr <per>

min ratio of successful PIN attempts/total tries [0]
-wpsretry -wpsmaxr <num>

max number of retries for same PIN before giving up [0]

OTHERS COMMANDS

-upgrade

Checks for new version
-update

Checks for new version

EXAMPLES

./wifite.py -wps -wep -c 6 -pps 600

AUTHOR

Dave M (derv82@gmail.com)

This manual page was written by Daniel Echeverry <epsilon77@gmail.com>, for the Debian project (and may be used by others).