• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

Wifite2 v2.7 - New version of the popular wireless network auditor

Status
Not open for further replies.

itsMe

*KillmeMories*
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
Joined
Jan 8, 2019
Messages
56,608
Solutions
2
Reputation
32
Reaction score
100,454
Points
2,313
Credits
32,600
‎6 Years of Service‎
 
76%
68747470733a2f2f692e696d6775722e636f6d2f51354b534462672e676966


A complete re-write of wifite, a Python script for auditing wireless networks.

Wifite runs existing wireless-auditing tools for you. Stop memorizing command arguments & switches!

Wifite is designed to use all known methods for retrieving the password of a wireless access point (router). These methods include:

    WPS: The Offline Pixie-Dust attack
    WPS: The Online Brute-Force PIN attack
    WPS: The Offline NULL PIN attack
    WPA: The WPA Handshake Capture + offline crack.
    WPA: The PMKID Hash Capture + offline crack.
    WEP: Various known attacks against WEP, including fragmentation, chop-chop, aireplay, etc.
    WIFI Signal jammer, block specific accesspoints or multiple. signal jamming only works for specific Atheros WiFi chipsets.

Run wifite, select your targets, and Wifite will automatically start trying to capture or crack the password.

Brief Feature List

    PMKID hash capture (enabled by-default, force with: --pmkid)
    WPS Offline Brute-Force Attack aka “Pixie-Dust”. (enabled by-default, force with: --wps-only --pixie)
    WPS Online Brute-Force Attack aka “PIN attack”. (enabled by-default, force with: --wps-only --no-pixie)
    WPA/2 Offline Brute-Force Attack via 4-Way Handshake capture (enabled by-default, force with: --no-wps)
    Validates handshakes against tshark, cowpatty, and aircrack-ng (when available)
    Various WEP attacks (replay, chopchop, fragment, hirte, p0841, caffe-latte)
    Automatically decloaks hidden access points while scanning or attacking.
        Note: Only works when channel is fixed. Use -c <channel>
        Disable this using --no-deauths
    5Ghz support for some wireless cards (via -5 switch).
        Note: Some tools don’t play well on 5GHz channels (e.g. aireplay-ng)
    Stores cracked passwords and handshakes to the current directory (--cracked)
        Includes information about the cracked access point (Name, BSSID, Date, etc).
    Easy to try to crack handshakes or PMKID hashes against a wordlist (--crack)

68747470733a2f2f692e696d6775722e636f6d2f69486366436a702e676966


Changelog v2.7

    Fix coWPatty support. Finally working again.
    Allow airodump-ng to exit & get reaped
    Supports latest hcxdumptool (v6.3.0) instead of older
    Updated Dockerfile to use Debian Bookworm.
    Updated the README.md


To see this hidden content, you must like this content.
 
Status
Not open for further replies.
Back
Top