Scroll to navigation

WIFITE(1) General Commands Manual WIFITE(1)

NAME

wifite - Python script to automate wireless auditing using aircrack-ng tools

SYNOPSIS

wifite [SETTINGS] [FILTERS]

DESCRIPTION

Wifite is a tool to audit WEP or WPA encrypted wireless networks. It uses aircrack-ng, pyrit, reaver, tshark tools to perform the audit.

This tool is customizable to be automated with only a few arguments and can be trusted to run without supervision.

COMMANDS


-check <file> check capfile <file> for handshakes.
-cracked display previously-cracked access points

GLOBAL


-all attack all targets. [off]
-i <iface> wireless interface for capturing [auto]
-mac Changes MAC address of 'iface' to a random MAC. [off]
-c <channel> channel to scan for targets [auto]
-e <essid> target a specific access point by ssid (name) [ask]
-b <bssid> target a specific access point by bssid (mac) [auto]
-showb display target BSSIDs after scan [off]
-pow <db> attacks any targets with signal strenghth > db [0]
-q -quiet do not print list of APs during scan [off]

WPA


-wpa only target WPA networks (works with -wps -wep) [off]
-wpat <sec> time to wait for WPA attack to complete (seconds) [500]
-wpadt <sec> time to wait between sending deauth packets (sec) [10]
-strip strip handshake using tshark or pyrit [off]
-crack <dic> crack WPA handshakes using <dic> wordlist file [off]
-dict <file> specify dictionary to use when cracking WPA [phpbb.txt]
-aircrack verify handshake using aircrack [on]
-pyrit verify handshake using pyrit [off]
-tshark verify handshake using tshark [on]

WEP


-wep only target WEP networks [off]
-pps <num> set the number of packets per second to inject [600]
-wept <sec> sec to wait for each attack, 0 implies endless [600]
-chopchop use chopchop attack [on]
-arpreplay use arpreplay attack [on]
-fragment use fragmentation attack [on]
-caffelatte use caffe-latte attack [on]
-p0841 use -p0841 attack [on]
-hirte use hirte (cfrag) attack [on]
-nofakeauth stop attack if fake authentication fails [off]
-wepca <n> start cracking when number of ivs surpass n [10000]
-wepsave save a copy of .cap files to this directory [off]

WPS


-wps only target WPS networks [off]
-wpst -wpstime <sec> max wait for new retry before giving up (0: never) [660]
-wpsratio -wpsr <per> min ratio of successful PIN attempts/total tries [0]
-wpsretry -wpsmaxr <num> max number of retries for same PIN before giving up [0]

OTHERS COMMANDS


-upgrade Checks for new version
-update Checks for new version

EXAMPLES


./wifite.py -wps -wep -c 6 -pps 600

AUTHOR

Dave M (derv82@gmail.com)

This manual page was written by Daniel Echeverry <epsilon77@gmail.com>, for the Debian project (and may be used by others).

30/07/2012