Rewrite of the popular wireless network auditor, "wifite"
Previous timeout for PMKID capture was 15 seconds. This was increased to 30 seconds by-default.
Users can specify the time to wait using --pmkid-timeout X
, where X is the number of seconds to wait.
When interrupting an attack, users can choose to:
Other small changes:
--force
into Bully to bypass warnings--wps-only
and --pmkid
are both specified, and exits with an error message.In this version, Wifite will attempt the WPS PIN attack (guessing < 11,000 PINs) after Pixie-Dust fails on WPS-enabled networks.
Wifite summarizes the Reaver (or Bully) output into a single line (updated every second). This includes:
--bully
)--bully
)There's some new options as well:
--bully
to use bully
instead of reaver
when doing the Pixie-Dust or PIN Attacks.--pixie
to avoid the PIN attack and use Pixie-Dust only.--no-pixie
to skip Pixie-Dust and only do WPS PIN attacks.Some other changes regarding "Locked" WPS networks:
lock
in the WPS column of the targets list.--ignore-lock
option.--crack
improvements:
john
, hashcat
, aircrack
, or cowpatty
--force
into hashcat
if no devices are found.(https://github.com/JPaulMora/Pyrit/issues/558#issuecomment-381366559)).all
as input when selecting handshakes.cracked.txt
if it's already been cracked (same bssid, essid, password, handshake, everything).Wordlist location when using sudo python setup.py install
did not match the wordlists checked by the config. Fixed in this version.
Semi-major version bump for significant changes:
sudo python setup.py install
)
wifite
as a python module to the machine./usr/sbin/wifite
./Wifte.py
was moved to bin/wifite
python bin/wifite
unless wifite is installed.To run wifite:
sudo wifite
at any terminal
wifite
should be found in the current path as it's installed to /usr/sbin
sudo python -m wifite
in the clone repo directory.--pmkid
option will only attack WPA networks with the new PMKID capture + crack attack
Improvements to --crack
feature:
*.16800
files in the hs
directory).--dict
) is not found, prompts user to enter a wordlist file.--crack
longer prints different ways to crack handshakes (Hashcat/Pyrit/Cowpatty/Aircrack/etc).
aircrack-ng
hashcat
.Other changes:
--crack
will show cracked results with one target per-line (improves readability).From #124, Wifite crashes during the PMKID attack if hashcat
or hcxdumptool
or hcxpcaptool
are missing.
This release fixes the crash; wifite will avoid the PMKID attack if any of the tools are missing.
More info on the PMKID attack: wifite2/PMKID.md
hashcat
can support -m 16800
(the PMKID hash attack).
haschat v4.1.2
or higher.hcxdumptool
and and hcxpcaptool
Airodump was stopped
errors (also AttributeError
with Process.__del__
and other similar errors)
ctrl+c
while Wifite is analyzing the latest packets (which is every second!).2.1.6
:
2.1.5
:
--keep-ivs
option to retain IVS files between attacks (#27)2.1.4
:
macchanger
airmon-ng
output2.1.3
:
--wps-time X
: Total time for WPS attack to complete--wps-timeouts X
: Max number of timeouts before failing--wps-fails X
: Max number of WPSFails before failing--help
messaging for WPS switches.100
pixiewps
failure looks like this: "Reaver says: 'WPS pin not found'"
2.1.2
:
--help
message, full help available with --help -v
or -hv
2.1.1
:
--clients-only
or -co
)Now that I have the script working consistently on my machine, it's time to open up to Beta & start fixing bugs other users are seeing.