wifite(1)
Python script to automate wireless auditing using aircrack-ng tools
Description
WIFITE
NAME
wifite - Python script to automate wireless auditing using aircrack-ng tools
SYNOPSIS
wifite [SETTINGS] [FILTERS]
DESCRIPTION
Wifite is a tool to audit WEP or WPA encrypted wireless networks. It uses aircrack-ng, pyrit, reaver, tshark tools to perform the audit.
This tool is customizable to be automated with only a few arguments and can be trusted to run without supervision.
COMMANDS
|
check capfile <file> for handshakes. | |||||
|
display previously-cracked access points |
GLOBAL
|
attack all targets. [off] |
wireless interface for capturing [auto] | ||||
|
Changes MAC address of ’iface’ to a random
MAC. [off] |
channel to scan for targets [auto] | ||||
|
target a specific access point by ssid (name) [ask] | |||||
|
target a specific access point by bssid (mac) [auto]
| |||||
|
display target BSSIDs after scan [off] |
|||||
|
attacks any targets with signal strenghth > db [0]
|
|||||
|
do not print list of APs during scan [off] |
WPA
|
only target WPA networks (works with -wps -wep) [off]
|
time to wait for WPA attack to complete (seconds) [500]
| ||||
|
time to wait between sending deauth packets (sec) [10]
| |||||
|
strip handshake using tshark or pyrit [off] |
crack WPA handshakes using <dic> wordlist file
[off] | ||||
|
specify dictionary to use when cracking WPA [phpbb.txt]
| |||||
|
verify handshake using aircrack [on] |
|||||
|
verify handshake using pyrit [off] |
|||||
|
verify handshake using tshark [on] |
WEP
|
only target WEP networks [off] |
set the number of packets per second to inject [600]
| ||||
|
sec to wait for each attack, 0 implies endless [600]
| |||||
|
use chopchop attack [on] |
use arpreplay attack [on] | ||||
|
use fragmentation attack [on] |
use caffe-latte attack [on] | ||||
|
use -p0841 attack [on] |
|||||
|
use hirte (cfrag) attack [on] |
stop attack if fake authentication fails [off] | ||||
|
start cracking when number of ivs surpass n [10000] | |||||
|
save a copy of .cap files to this directory [off] |
WPS
|
only target WPS networks [off] |
max wait for new retry before giving up (0: never) [660]
| ||||||
|
min ratio of successful PIN attempts/total tries [0]
| |||||||
|
max number of retries for same PIN before giving up [0] |
OTHERS COMMANDS
|
Checks for new version | ||||
|
Checks for new version |
EXAMPLES
./wifite.py -wps -wep -c 6 -pps 600
AUTHOR
Dave M (derv82@gmail.com)
This manual page was written by Daniel Echeverry <epsilon77@gmail.com>, for the Debian project (and may be used by others).