11 Jun 2018

Wifite is created to attack multiple WEP and WPA encrypted networks at the same time. This tool is customizable to be automated with only a few arguments and can be trusted to run without supervision.

It’s a great tool to script into part of a toolkit for Wifi security assessments and is a handy wifi wep key cracker.

The biggest change from version 1 is support for “reaver”, a Wifi-Protected Setup (WPS) attack tool. Reaver can compromise the PIN and PSK for many routers that have WPS enabled, usually within hours.

Features of wifite

  • sorts targets by power (in dB); cracks closest access points first
  • all WPA handshakes are backed up (to the working directory)
  • mid-attack options: stop during attack with Ctrl+C to use (continue, move onto next target, skip to cracking, exit)
  • numerous filters to specify exactly what to attack (wep/wpa/both, above certain signal strengths, channels, etc)
  • very customizable settings (timeouts, packets/sec, etc)
  • SKA support (untested)
  • finds devices in monitor mode; if none are found, prompts for selection
  • all passwords saved to log.txt
  • switching WEP attacks does not reset IVS
  • displays session summary at exit; shows any cracked keys

Installing & Running

git clone https://github.com/derv82/wifite2.git
cd wifite2
./Wifite.py

IT Security Professional – Security Researcher & Consultant for the Government, Enthusiast, Malware Analyst, Penetration Tester.

Leave your thought

This site uses Akismet to reduce spam. Learn how your comment data is processed.