wifite(1) Python script to automate wireless auditing using aircrack-ng tools

SYNOPSIS

wifite [SETTINGS] [FILTERS]

DESCRIPTION

Wifite is a tool to audit WEP or WPA encrypted wireless networks. It uses aircrack-ng, pyrit, reaver, tshark tools to perform the audit.

This tool is customizable to be automated with only a few arguments and can be trusted to run without supervision.

COMMANDS


  -check <file> check capfile <file> for handshakes.

  -cracked              display previously-cracked access points

GLOBAL


  -all          attack all targets.              [off]

  -i <iface>    wireless interface for capturing [auto]

  -mac          Changes MAC address of 'iface' to a random MAC. [off]

  -c <channel>  channel to scan for targets      [auto]

  -e <essid>    target a specific access point by ssid (name)  [ask]

  -b <bssid>    target a specific access point by bssid (mac)  [auto]

  -showb        display target BSSIDs after scan               [off]

  -pow <db>     attacks any targets with signal strenghth > db [0]

  -q -quiet     do not print list of APs during scan           [off]  

WPA


  -wpa          only target WPA networks (works with -wps -wep)   [off]

  -wpat <sec>   time to wait for WPA attack to complete (seconds) [500]

  -wpadt <sec>  time to wait between sending deauth packets (sec) [10]

  -strip        strip handshake using tshark or pyrit             [off]

  -crack <dic>  crack WPA handshakes using <dic> wordlist file    [off]

  -dict <file>  specify dictionary to use when cracking WPA [phpbb.txt]

  -aircrack     verify handshake using aircrack [on]

  -pyrit        verify handshake using pyrit    [off]

  -tshark       verify handshake using tshark   [on]

WEP


  -wep          only target WEP networks [off]

  -pps <num>    set the number of packets per second to inject [600]

  -wept <sec>   sec to wait for each attack, 0 implies endless [600]

  -chopchop     use chopchop attack      [on]

  -arpreplay    use arpreplay attack     [on]

  -fragment     use fragmentation attack [on]

  -caffelatte   use caffe-latte attack   [on]

  -p0841        use -p0841 attack        [on]

  -hirte        use hirte (cfrag) attack [on]

  -nofakeauth   stop attack if fake authentication fails    [off]

  -wepca <n>    start cracking when number of ivs surpass n [10000]

  -wepsave      save a copy of .cap files to this directory [off]  

WPS


  -wps                          only target WPS networks         [off]

  -wpst -wpstime <sec>  max wait for new retry before giving up (0: never)  [660]

  -wpsratio -wpsr <per> min ratio of successful PIN attempts/total tries    [0]

  -wpsretry -wpsmaxr <num>      max number of retries for same PIN before giving up [0]

OTHERS COMMANDS


  -upgrade      Checks for new version

  -update       Checks for new version

EXAMPLES


  ./wifite.py -wps -wep -c 6 -pps 600

AUTHOR

Dave M ([email protected])

This manual page was written by Daniel Echeverry <[email protected]>, for the Debian project (and may be used by others).