Wifite kali linux github

Wifite kali linux github

This repo is a complete re-write of wifite , a Python script for auditing wireless networks.

Wifite runs existing wireless-auditing tools for you. Stop memorizing command arguments & switches!

Wifite is designed to use all known methods for retrieving the password of a wireless access point (router). These methods include:

Run wifite, select your targets, and Wifite will automatically start trying to capture or crack the password.

  • derv82
  • kimocoder
  • deix
  • WhiteOnBlackCode
  • Niller303
  • examin
  • rhertzog
  • ChunshengZhao
  • EdwardBetts
  • schoonc
  • random-robbie
  • ritiek
  • viniciusmarangoni
  • goll

Supported Operating Systems

Wifite is designed specifically for the latest version of Kali Linux. ParrotSec is also supported.

Other pen-testing distributions (such as BackBox or Ubuntu) have outdated versions of the tools used by Wifite. Do not expect support unless you are using the latest versions of the Required Tools, and also patched wireless drivers that support injection.

First and foremost, you will need a wireless card capable of «Monitor Mode» and packet injection (see this tutorial for checking if your wireless card is compatible and also this guide). There are many cheap wireless cards that plug into USB available from online stores.

Second, only the latest versions of these programs are supported and must be installed for Wifite to work properly:

Required:

  • python : Wifite is compatible with both python2 and python3 .
  • iwconfig : For identifying wireless devices already in Monitor Mode.
  • ifconfig : For starting/stopping wireless devices.
  • Aircrack-ng suite, includes:
    • airmon-ng : For enumerating and enabling Monitor Mode on wireless devices.
    • aircrack-ng : For cracking WEP .cap files and WPA handshake captures.
    • aireplay-ng : For deauthing access points, replaying capture files, various WEP attacks.
    • airodump-ng : For target scanning & capture file generation.
    • packetforge-ng : For forging capture files.

Optional, but Recommended:

  • tshark : For detecting WPS networks and inspecting handshake capture files.
  • reaver : For WPS Pixie-Dust & brute-force attacks.
    • Note: Reaver’s wash tool can be used to detect WPS networks if tshark is not found.
  • bully : For WPS Pixie-Dust & brute-force attacks.
    • Alternative to Reaver. Specify —bully to use Bully instead of Reaver.
    • Bully is also used to fetch PSK if reaver cannot after cracking WPS PIN.
  • coWPAtty : For detecting handshake captures.
  • pyrit : For detecting handshake captures.
  • hashcat : For cracking PMKID hashes.
    • hcxdumptool : For capturing PMKID hashes.
    • hcxpcaptool : For converting PMKID packet captures into hashcat ‘s format.

To install onto your computer (so you can just run wifite from any terminal), run:

This will install wifite to /usr/sbin/wifite which should be in your terminal path.

Note: Uninstalling is not as easy. The only way to uninstall is to record the files installed by the above command and remove those files:

Brief Feature List

  • PMKID hash capture (enabled by-default, force with: —pmkid )
  • WPS Offline Brute-Force Attack aka «Pixie-Dust». (enabled by-default, force with: —wps-only —pixie )
  • WPS Online Brute-Force Attack aka «PIN attack». (enabled by-default, force with: —wps-only —no-pixie )
  • WPA/2 Offline Brute-Force Attack via 4-Way Handshake capture (enabled by-default, force with: —no-wps )
  • Validates handshakes against pyrit , tshark , cowpatty , and aircrack-ng (when available)
  • Various WEP attacks (replay, chopchop, fragment, hirte, p0841, caffe-latte)
  • Automatically decloaks hidden access points while scanning or attacking.
    • Note: Only works when channel is fixed. Use -c
    • Disable this using —no-deauths
  • 5Ghz support for some wireless cards (via -5 switch).
    • Note: Some tools don’t play well on 5GHz channels (e.g. aireplay-ng )
  • Stores cracked passwords and handshakes to the current directory ( —cracked )
    • Includes information about the cracked access point (Name, BSSID, Date, etc).
  • Easy to try to crack handshakes or PMKID hashes against a wordlist ( —crack )
Читайте также:  Pc twin shock для windows 10

Comparing this repo to the «old wifite» @ https://github.com/derv82/wifite

  • Less bugs
    • Cleaner process management. Does not leave processes running in the background (the old wifite was bad about this).
    • No longer «one monolithic script». Has working unit tests. Pull requests are less-painful!
  • Speed
    • Target access points are refreshed every second instead of every 5 seconds.
  • Accuracy
    • Displays realtime Power level of currently-attacked target.
    • Displays more information during an attack (e.g. % during WEP chopchop attacks, Pixie-Dust step index, etc)
  • Educational
    • The —verbose option (expandable to -vv or -vvv ) shows which commands are executed & the output of those commands.
    • This can help debug why Wifite is not working for you. Or so you can learn how these tools are used.
  • More-actively developed.
  • Python 3 support.
  • Sweet new ASCII banner.
  • Some command-line arguments ( —wept , —wpst , and other confusing switches).
    • You can still access some of these obscure options, try wifite -h -v
  • (Mostly) Backwards compatible with the original wifite ‘s arguments.
  • Same text-based interface everyone knows and loves.

Cracking WPS PIN using reaver ‘s Pixie-Dust attack, then fetching WPA key using bully :

Cracking WPA key using PMKID attack:

Decloaking & cracking a hidden access point (via the WPA Handshake attack):

Cracking a weak WEP password (using the WEP Replay attack):

Cracking a pre-captured handshake using John The Ripper (via the —crack option):

About

Rolling Release Branch for community PR’s @credits to derv82 & the community

Источник

Wifite kali linux github

This repo is a complete re-write of wifite , a Python script for auditing wireless networks.

Wifite runs existing wireless-auditing tools for you. Stop memorizing command arguments & switches!

Wifite is designed to use all known methods for retrieving the password of a wireless access point (router). These methods include:

Run wifite, select your targets, and Wifite will automatically start trying to capture or crack the password.

Supported Operating Systems

Wifite is designed specifically for the latest version of Kali Linux. ParrotSec is also supported.

Other pen-testing distributions (such as BackBox or Ubuntu) have outdated versions of the tools used by Wifite. Do not expect support unless you are using the latest versions of the Required Tools, and also patched wireless drivers that support injection.

Читайте также:  Как узнать пароль от mac os big sur

First and foremost, you will need a wireless card capable of «Monitor Mode» and packet injection (see this tutorial for checking if your wireless card is compatible and also this guide). There are many cheap wireless cards that plug into USB available from online stores.

Second, only the latest versions of these programs are supported and must be installed for Wifite to work properly:

Required:

  • python : Wifite is compatible with both python2 and python3 .
  • iwconfig : For identifying wireless devices already in Monitor Mode.
  • ifconfig : For starting/stopping wireless devices.
  • Aircrack-ng suite, includes:
    • airmon-ng : For enumerating and enabling Monitor Mode on wireless devices.
    • aircrack-ng : For cracking WEP .cap files and WPA handshake captures.
    • aireplay-ng : For deauthing access points, replaying capture files, various WEP attacks.
    • airodump-ng : For target scanning & capture file generation.
    • packetforge-ng : For forging capture files.

Optional, but Recommended:

  • tshark : For detecting WPS networks and inspecting handshake capture files.
  • reaver : For WPS Pixie-Dust & brute-force attacks.
    • Note: Reaver’s wash tool can be used to detect WPS networks if tshark is not found.
  • bully : For WPS Pixie-Dust & brute-force attacks.
    • Alternative to Reaver. Specify —bully to use Bully instead of Reaver.
    • Bully is also used to fetch PSK if reaver cannot after cracking WPS PIN.
  • coWPAtty : For detecting handshake captures.
  • pyrit : For detecting handshake captures.
  • hashcat : For cracking PMKID hashes.
    • hcxdumptool : For capturing PMKID hashes.
    • hcxpcaptool : For converting PMKID packet captures into hashcat ‘s format.

To install onto your computer (so you can just run wifite from any terminal), run:

This will install wifite to /usr/sbin/wifite which should be in your terminal path.

Note: Uninstalling is not as easy. The only way to uninstall is to record the files installed by the above command and remove those files:

Brief Feature List

  • PMKID hash capture (enabled by-default, force with: —pmkid )
  • WPS Offline Brute-Force Attack aka «Pixie-Dust». (enabled by-default, force with: —wps-only —pixie )
  • WPS Online Brute-Force Attack aka «PIN attack». (enabled by-default, force with: —wps-only —no-pixie )
  • WPA/2 Offline Brute-Force Attack via 4-Way Handshake capture (enabled by-default, force with: —no-wps )
  • Validates handshakes against pyrit , tshark , cowpatty , and aircrack-ng (when available)
  • Various WEP attacks (replay, chopchop, fragment, hirte, p0841, caffe-latte)
  • Automatically decloaks hidden access points while scanning or attacking.
    • Note: Only works when channel is fixed. Use -c
    • Disable this using —no-deauths
  • 5Ghz support for some wireless cards (via -5 switch).
    • Note: Some tools don’t play well on 5GHz channels (e.g. aireplay-ng )
  • Stores cracked passwords and handshakes to the current directory ( —cracked )
    • Includes information about the cracked access point (Name, BSSID, Date, etc).
  • Easy to try to crack handshakes or PMKID hashes against a wordlist ( —crack )
Читайте также:  Как отформатировать диск если нет windows

Comparing this repo to the «old wifite» @ https://github.com/derv82/wifite

  • Less bugs
    • Cleaner process management. Does not leave processes running in the background (the old wifite was bad about this).
    • No longer «one monolithic script». Has working unit tests. Pull requests are less-painful!
  • Speed
    • Target access points are refreshed every second instead of every 5 seconds.
  • Accuracy
    • Displays realtime Power level of currently-attacked target.
    • Displays more information during an attack (e.g. % during WEP chopchop attacks, Pixie-Dust step index, etc)
  • Educational
    • The —verbose option (expandable to -vv or -vvv ) shows which commands are executed & the output of those commands.
    • This can help debug why Wifite is not working for you. Or so you can learn how these tools are used.
  • More-actively developed.
  • Python 3 support.
  • Sweet new ASCII banner.
  • Some command-line arguments ( —wept , —wpst , and other confusing switches).
    • You can still access some of these obscure options, try wifite -h -v
  • (Mostly) Backwards compatible with the original wifite ‘s arguments.
  • Same text-based interface everyone knows and loves.

Cracking WPS PIN using reaver ‘s Pixie-Dust attack, then fetching WPA key using bully :

Cracking WPA key using PMKID attack:

Decloaking & cracking a hidden access point (via the WPA Handshake attack):

Cracking a weak WEP password (using the WEP Replay attack):

Cracking a pre-captured handshake using John The Ripper (via the —crack option):

Источник

Wifite kali linux github

A complete re-write of wifite , a Python script for auditing wireless networks.

  • Lots of files instead of «one big script».
  • Cleaner process management — No longer leaves processes running in the background.
  • UX: Target access points are refreshed every second instead of every 5 seconds.
  • UX: Displays realtime Power level (in db) of currently-attacked target
  • Backwards compatibility with the original wifite ‘s arguments.
  • Same text-based interface everyone knows and loves.

Full Feature List

  • Reaver Pixie-Dust attack ( —pixie )
  • Reaver WPS PIN attack ( —reaver )
  • WPA handshake capture ( —no-reaver )
  • Validates handshakes against pyrit , tshark , cowpatty , and aircrack-ng
  • Various WEP attacks (replay, chopchop, fragment, etc)
  • 5Ghz support for wireless cards that support 5ghz (use -5 option)
  • Stores cracked passwords and handshakes to the current directory, with metadata about the access point (via —cracked command).
  • Decloaks hidden access points when channel is fixed (use -c option)
  • Provides commands to crack captured WPA handshakes (via —crack command)

Wifite2 is designed entirely for the latest version of Kali Rolling release (tested on Kali 2016.2, updated May 2017).

This means only the latest versions of these programs are supported: Aircrack-ng suite, wash, reaver, tshark, cowpatty.

Other pen-testing distributions (such as BackBox) have outdated versions of these suites; these distributions are not supported.

Decloaking & cracking a hidden access point (via the WPA Handshake attack):

Cracking a weak WEP password (using the WEP Replay attack):

Various cracking options (using —crack option):

Источник

Оцените статью