Linux Wifite v2

Discussion in 'Software Downloads' started by Mr. Penguin, 3 Jun 2012.

  1. Mr. Penguin

    Mr. Penguin Administrator
    Staff Member Admin Moderator VIP

    Joined:
    18 May 2012
    Messages:
    3,096
    Likes Received:
    1,195
    [​IMG]

    To attack multiple WEP, WPA, and WPS encrypted networks in a row. This tool is customizable to be automated with only a few arguments. Wifite aims to be the "set it and forget it" wireless auditing tool. Pretty sure this comes with BackTrack 5R2 and can be installed on many other Linux distros.

    Support for cracking WPS-encrypted networks (via Reaver)
    2 new WEP attacks
    More accurate WPA handshake capture

    Version 2 does not include a GUI, so everything must be done at the command-line.

    Features
    • Sorts targets by signal strength (in dB); cracks closest access points first
    • Automatically de-authenticates clients of hidden networks to reveal SSIDs
    • Numerous filters to specify exactly what to attack (wep/wpa/both, above certain signal strengths, channels, etc)
    • customizable settings (timeouts, packets/sec, etc)
    • Anonymous feature; changes MAC to a random address before attacking, then changes back when attacks are complete
    • All captured WPA handshakes are backed up to wifite.py's current directory
    • Smart WPA de-authentication; cycles between all clients and broadcast deauths
    • Stop any attack with Ctrl+C, with options to continue, move onto next target, skip to cracking, or exit
    • Displays session summary at exit; shows any cracked keys
    • all passwords saved to cracked.txt
    • Built-in updater: ./wifite.py -upgrade

    Requirements
    • Linux operating system
    • Python 2.6.x, and python 2.7.x,
    • Wireless drivers patched for monitor mode and injection. Most security distributions (Backtrack, BlackBuntu, etc) come with wireless drivers pre-patched
    • Aircrack-ng (v1.1) suite: available via apt: apt-get install aircrack-ng or at the aircrack-ng website,

    Suggested Applications
    • Reaver: for attacking WPS-encrypted networks
    • Pyrit, cowpatty, tshark: not required, but help verify WPA handshake captures

    Execution
    Download the latest version through Terminal.

    Code:
    Select All
    wget -O wifite.py http://wifite.googlecode.com/svn/trunk/wifite.py
    change permissions to executable:
    Code:
    Select All
    chmod +x wifite.py
    Execute:
    Code:
    Select All
    python wifite.py
    or, to see a list of commands with info:
    Code:
    Select All
    ./wifite.py -help
    Screenshots

    Successful WEP attack (after 90 seconds)
    [​IMG]

    Successful WPS attacks (after 17 hours)
    [​IMG]

    Video tutorial (tutorial is for v1 of wifite. new videos coming soon)​
    Watch this video on YouTube.

    Capturing WPA handshake using Wifite (and then cracking with oclHashCat).

    Video credit: Maurizio Schmidt

    Examples
    The program contains lots of interactivity (waits for user input). these command-line options are meant to make the program 100% automated -- no supervision required.

    Crack all WEP access points
    Code:
    Select All
    ./wifite.py -all -wep
    Crack all WPS access points with signal strength greater than (or equal to) 50dB
    Code:
    Select All
    ./wifite.py -p 50 -wps
    Attack all access points, use 'darkc0de.lst' for cracking WPA handshakes
    Code:
    Select All
    ./wifite.py -all --dict /pentest/passwords/wordlists/darkc0de.lst
    Attack all WPA access points, but do not try to crack -- any captured handshakes are saved automatically
    Code:
    Select All
    ./wifite.py -all -wpa --dict none
    Crack all WEP access points greater than 50dB in strength, giving 5 minutes for each WEP attack method, and send packets at 600 packets/sec:
    Code:
    Select All
    ./wifite.py --pow 50 -wept 300 -pps 600
    Attempt to crack WEP-encrypted access point "2WIRE752" endlessly -- program will not stop until key is cracked or user interrrupts with ctrl+C)
    Code:
    Select All
    ./wifite.py -e "2WIRE752" -wept 0
    Alternatively you can download the Python script here
     
  2. reyman76

    reyman76 Well-Known Member
    VIP

    Joined:
    29 Jan 2013
    Messages:
    258
    Likes Received:
    18
  3. Mr. Penguin

    Mr. Penguin Administrator
    Staff Member Admin Moderator VIP

    Joined:
    18 May 2012
    Messages:
    3,096
    Likes Received:
    1,195
    There is no ISO
     
  4. reyman76

    reyman76 Well-Known Member
    VIP

    Joined:
    29 Jan 2013
    Messages:
    258
    Likes Received:
    18
    Mr. Penguin
    how can i get wifite? n how to run in xiaopan???:)
     
  5. Mr. Penguin

    Mr. Penguin Administrator
    Staff Member Admin Moderator VIP

    Joined:
    18 May 2012
    Messages:
    3,096
    Likes Received:
    1,195
Loading...
  • About Us

    We are a community mixed with professionals and beginners with an interest in wireless security, auditing and pentesting. Feel free to check out and upload resources.


    You can also find us on: Twitter and Facebook

  • Donate to Us

    Did you find our forums useful? Feel free to donate Bitcoin to us using the form below. Those who donate the equivlent of $10 USD or more will be upgraded to VIP membership. Don't have Bitcoin? Use your credit card to GO VIP here. Don't want to fork out some coin? There are other ways to GO VIP. Bitcoin: 1LMTGSoTyJWXuy2mQkHfgMzD7ez74x1Z8K