![]() |
Wifite 2 - An automated Wireless Attack tool |
A complete re-write of Wifite, a Python script for auditing wireless networks.
Wifite runs existing wireless-auditing tools for you. Stop memorizing command arguments & switches!
What's new in Wifite2?
Less bugs
* Cleaner process management. Does not leave processes running in the background (the old Wifite was bad about this).
* No longer "one monolithic script". Has working unit tests. Pull requests are less-painful!
Speed: Target access points are refreshed every second instead of every 5 seconds.
Accuracy
* Displays realtime Power level of currently-attacked target.
* Displays more information during an attack (e.g. % during WEP chopchop attacks, Pixie-Dust step index, etc)
Educational
* The --verbose option (expandable to -vv or -vvv) shows which commands are executed & the output of those commands.
* This can help debug why Wifite is not working for you. Or so you can learn how these tools are used.
Orther
* Actively developed (as of March 2018).
* Python 3 support.
* Sweet new ASCII banner.
What's gone in Wifite2?
* No more WPS PIN attack, because it can take days on-average. However, the Pixie-Dust attack is still an option.
* Some command-line arguments (--wept, --wpst, and other confusing switches). You can still access some of these, try python Wifite.py -h -v
What's not new?
* (Mostly) Backwards compatibile with the original Wifite's arguments.
* Same text-based interface everyone knows and loves.
Brief Feature List
* Reaver (or -bully) Pixie-Dust attack (enabled by-default, force with: --wps-only)
* WPA handshake capture (enabled by-default, force with: --no-wps)
* Validates handshakes against pyrit, tshark, cowpatty, and aircrack-ng (when available)
* Various WEP attacks (replay, chopchop, fragment, hirte, p0841, caffe-latte)
* Automatically decloaks hidden access points while scanning or attacking.
Note: Only works when channel is fixed. Use the -c <channel> switch.
Disable this via --no-deauths switch
* 5Ghz support for some wireless cards (via -5 switch).
Note: Some tools don't play well on 5GHz channels (e.g. aireplay-ng)
* Stores cracked passwords and handshakes to the current directory (--cracked)
Includes metadata about the access point.
* Provides commands to crack captured WPA handshakes (--crack)
Includes all commands needed to crack using aircrack-ng, john, hashcat, or pyrit.
Linux Distribution Support
Wifite2 is designed specifically for the latest version of Kali's rolling release (tested on Kali 2017.2, updated Jan 2018).
Other pen-testing distributions (such as BackBox) have outdated versions of the tools used by Wifite; these distributions are not supported.
Required Tools: Only the latest versions of these programs are supported
Required:
iwconfig: For identifying wireless devices already in Monitor Mode.
ifconfig: For starting/stopping wireless devices.
Aircrack-ng suite, includes:
aircrack-ng: For cracking WEP .cap files and and WPA handshake captures.
aireplay-ng: For deauthing access points, replaying capture files, various WEP attacks.
airmon-ng: For enumerating and enabling Monitor Mode on wireless devices.
airodump-ng: For target scanning & capture file generation.
packetforge-ng: For forging capture files.
Optional, but Recommended:
tshark: For detecting WPS networks and inspecting handshake capture files.
reaver: For WPS Pixie-Dust attacks.
Note: Reaver's wash tool can be used to detect WPS networks if tshark is not found.
bully: For WPS Pixie-Dust attacks.
Alternative to Reaver. Specify --bully to use Bully instead of Reaver.
Bully is also used to fetch PSK if reaver cannot after cracking WPS PIN.
cowpatty: For detecting handshake captures.
pyrit: For detecting handshake captures.
Installing & Running
git clone https://github.com/derv82/wifite2 (Install Wifite)
cd wifite2
sudo python Wifite.py or sudo python3 Wifite.py (Run Wifite 2)
Screenshots
Cracking WPS PIN using reaver's Pixie-Dust attack, then retrieving WPA PSK using bully:
Decloaking & cracking a hidden access point (via the WPA Handshake attack):
Cracking a weak WEP password (using the WEP Replay attack):
Various cracking options (using --crack option):
No comments:
Post a Comment