You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: readme.md
+38-24Lines changed: 38 additions & 24 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,42 +3,47 @@ wifite
3
3
4
4
An automated wireless attack tool.
5
5
6
-
About
7
-
-----
8
-
9
-
_Wifite is for Linux only._
10
-
11
-
Wifite was designed for use with pentesting distributions of Linux, such as [Kali Linux](http://www.kali.org/), [Pentoo](http://www.pentoo.ch/), [BackBox](http://www.backbox.org); any Linux distributions with wireless drivers patched for injection. The script appears to also operate with Ubuntu 11/10, Debian 6, and Fedora 16.
6
+
Introduction
7
+
------------
12
8
13
-
Wifite must be run as __root__. This is required by the suite of programs it uses. Running downloaded scripts as root is a bad idea. I recommend using the Kali Linux bootable Live CD, a bootable USB stick (for persistent), or a virtual machine. Note that Virtual Machines cannot directly access hardware so a wireless USB dongle would be required.
9
+
wifite is a program automates wireless access points (WEP, WPA and WPS) attacking and cracking. Traditionally it has to be done manually and involved numerous program with many parameters, which is very inconvenient for batch access points security auditing. This little python script saves your time by automatically attack chosen access points in batch.
14
10
15
-
Wifite assumes that you have a wireless card and the appropriate drivers that are patched for injection and promiscuous/monitor mode.
16
-
17
-
18
-
Execution
19
-
---------
11
+
Installation
12
+
------------
20
13
21
14
To download and execute wifite, run the commands below:
22
15
23
-
`wget https://github.com/derv82/wifite/raw/master/wifite.py` (devr82's version) or `wget https://github.com/brianpow/wifite/raw/master/wifite.py` (brianpow's version)
16
+
`wget https://github.com/derv82/wifite/raw/master/wifite.py` (devr82's orginal version) or `wget https://github.com/brianpow/wifite/raw/master/wifite.py` (my fork)
24
17
`chmod +x wifite.py`
25
18
`./wifite.py`
26
19
20
+
Usage
21
+
-----
27
22
28
-
### More Complex Examples (only work in brianpow's version)###
wifite.py --showb --attack all,-eMYWIFI,-wpa0,-wps2,wps1 --timeout 120,e,n\>50 --save ap --two
32
26
```
33
-
Meaning: Anonymize my MAC address; show BSSID when scanning; attack all APs excepts APs with name containing MYWIFI, exclude WPA APs without client; Automatically attack APs after scanning for 120 seconds, or if hidden network is detected, or if total targets are more than 50; Save scanned APs into ap.csv; List APs in two columns; Save '.wpc' progress file after WPS PIN attack in 'wps' folder under current folder; Save captured IVs file in '.ivs' format under 'wep' of current folder.
34
27
28
+
Meaning: show BSSID when scanning; attack all APs excepts APs with name containing MYWIFI, exclude WPA APs without client, exclude both locked and WPS-enabled APs and include wps-enabled AP (i.e. remove WPS locked APs); Automatically attack APs after scanning for 120 seconds, or if hidden network is detected, or if total targets are more than 50; Save scanned APs into ap.csv and ap.cap; List APs in two columns.
29
+
30
+
31
+
Requirement
32
+
-----------
35
33
36
-
Required Programs
37
-
-----------------
34
+
### Mandatory Requirement ###
38
35
39
-
Please see [the installation guide](https://github.com/derv82/wifite/wiki/Installation) on the wiki for help installing any of the tools below.
36
+
#### Hardware ####
40
37
41
-
*[__Python 2.7.x__](http://python.org/getit/). Wifite is a Python script and requires Python to run.
38
+
* Wireless card with supported driver for entering promiscuous/monitor mode and support packet injection (USB wireless dongle if you are running in virtual machine.)
39
+
40
+
#### Software ####
41
+
42
+
Pentesting distributions of Linux, such as [Kali Linux](http://www.kali.org/), [Pentoo](http://www.pentoo.ch/), [BackBox](http://www.backbox.org) (Ubuntu 11/10, Debian 6, and Fedora 16 may work but not confirmed).
43
+
44
+
Unless you are using very old distro of Linux, the following software should be pre-installed and available. Please see [the installation guide](https://github.com/derv82/wifite/wiki/Installation) on the wiki if you really need to install any of the tools below manually.
45
+
46
+
*[__Python 2.7.x__](http://python.org/getit/). wifite is a Python script and requires Python to run.
This is absolutely required. The specific programs used in the suite are:
@@ -51,22 +56,31 @@ Please see [the installation guide](https://github.com/derv82/wifite/wiki/Instal
51
56
* Standard linux programs.
52
57
* iwconfig, ifconfig, which, iw
53
58
54
-
Suggested Programs
55
-
------------------
59
+
### Recommended Hardware/Software ###
60
+
61
+
#### Hardware ####
62
+
63
+
* Computer with NVIDIA or ATI display card (for accelerated cracking)
64
+
65
+
#### Software ####
56
66
57
67
_`*` indicates program is not included in [Backtrack 5 R1](http://www.backtrack-linux.org/)_
58
68
59
-
*`*`[__reaver__](http://code.google.com/p/reaver-wps/), a Wifi-Protected Setup (WPS) attack tool. Reaver includes a scanner "walsh" (or "wash") for detecting WPS-enabled access points. Wifite uses Reaver to scan for and attack WPS-enabled routers.
69
+
*`*`[__reaver__](https://github.com/t6x/reaver-wps-fork-t6x), a Wifi-Protected Setup (WPS) attack tool. Reaver includes a scanner "walsh" (or "wash") for detecting WPS-enabled access points. wifite uses Reaver to scan for and attack WPS-enabled routers.
60
70
61
71
*`*`[__pyrit__](http://code.google.com/p/pyrit/), a GPU cracker for WPA PSK keys. Wifite uses pyrit (if found) to detect handshakes.
62
72
63
73
*__tshark__. Comes bundled with [Wireshark](http://www.wireshark.org/), packet sniffing software.
64
74
65
75
*[__cowpatty__](http://www.willhackforsushi.com/Cowpatty.html), a WPA PSK key cracker. Wifite uses cowpatty (if found) to detect handshakes.
66
76
77
+
#### Others ####
78
+
79
+
* Rainbow table (for accelerated cracking)
80
+
67
81
Licensing
68
82
---------
69
83
70
-
Wifite is licensed under the GNU General Public License version 2 (GNU GPL v2).
84
+
wifite is licensed under the GNU General Public License version 2 (GNU GPL v2).
0 commit comments