Wifite v-2.0 r85 released.

What’s new in this version:

  • support for cracking WPS-encrypted networks (via reaver)
  • 2 new WEP attacks
  • more accurate WPA handshake capture
  • various bug fixes

Version 2 does not include a GUI, so everything must be done at the command-line.

WPS Attack screenshot

purpose
To attack multiple WEP, WPA, and WPS encrypted networks in a row. This tool is customizable to be automated with only a few arguments. Wifite aims to be the “set it and forget it” wireless auditing tool.

features

  • sorts targets by signal strength (in dB); cracks closest access points first
  • automatically de-authenticates clients of hidden networks to reveal SSIDs
  • numerous filters to specify exactly what to attack (wep/wpa/both, above certain signal strengths, channels, etc)
  • customizable settings (timeouts, packets/sec, etc)
  • “anonymous” feature; changes MAC to a random address before attacking, then changes back when attacks are complete
  • all captured WPA handshakes are backed up to wifite.py’s current directory
  • smart WPA de-authentication; cycles between all clients and broadcast deauths
  • stop any attack with Ctrl+C, with options to continue, move onto next target, skip to cracking, or exit
  • displays session summary at exit; shows any cracked keys
  • all passwords saved to cracked.txt
  • built-in updater: ./wifite.py -upgrade
WEP Screenshoot attack

requirements
linux operating system (confirmed working on Backtrack 5, BackBox, BlackBuntu, Pentoo, Ubuntu 8.10 (BT4R1), Ubuntu 10.04, Debian 6, Fedora 16)
tested working with python 2.6.x, and python 2.7.x,
wireless drivers patched for monitor mode and injection. Most security distributions (Backtrack, BlackBuntu, etc) come with wireless drivers pre-patched,
aircrack-ng (v1.1) suite: available via apt: apt-get install aircrack-ng or at the aircrack-ng website,

COMMANDS
-check check capfile for handshakes.
-cracked    display previously-cracked access points

 GLOBAL
-all         attack all targets.              [off]
-i  wireless interface for capturing [auto]
-mac         anonymize mac address            [off]
-c channel to scan for targets      [auto]
-e  target a specific access point by ssid (name)  [ask]
-b  target a specific access point by bssid (mac)  [auto]
-showb       display target BSSIDs after scan               [off]
-pow   attacks any targets with signal strenghth > db [0]
-quiet      do not print list of APs during scan           [off]

WPA
-wpa        only target WPA networks (works with -wps -wep)   [off]
-wpat   time to wait for WPA attack to complete (seconds) [500]
-wpadt  time to wait between sending deauth packets (sec) [10]
-strip      strip handshake using tshark or pyrit             [off]
-crack crack WPA handshakes using wordlist file    [off]
-dict specify dictionary to use when cracking WPA [phpbb.txt]
-aircrack   verify handshake using aircrack [on]
-pyrit      verify handshake using pyrit    [off]
-tshark     verify handshake using tshark   [on]
-cowpatty  verify handshake using cowpatty [off]

WEP
-wep        only target WEP networks [off]
-pps  set the number of packets per second to inject [600]
-wept sec to wait for each attack, 0 implies endless [600]
-chopchop   use chopchop attack      [on]
-arpreplay  use arpreplay attack     [on]
-fragment   use fragmentation attack [on]
-caffelatte use caffe-latte attack   [on]
-p0841      use -p0841 attack        [on]
-hirte      use hirte (cfrag) attack [on]
-nofakeauth stop attack if fake authentication fails    [off]
-wepca  start cracking when number of ivs surpass n [10000]
-wepsave    save a copy of .cap files to this directory [off]

 WPS
-wps       only target WPS networks         [off]
-wpst  max wait for new retry before giving up (0: never)  [660]
-wpsratiomin ratio of successful PIN attempts/total tries    [0]-wpsretrymax number of retries for same PIN before giving up [0]

 EXAMPLE
./wifite.py -wps -wep -c 6 -pps 600

Download : wifite-2.0r85.tar.gz (32.4 KB)
Find Other Version |
Read more in here : http://code.google.com/p/wifite/