Wifite v2 is now available
Get the latest version on Github
What’s new in this version:
Version 2 does not include a GUI, so everything must be done at the command-line.
Designed and tested on Linux; works with Backtrack 5, BlackBuntu, BackBox, and Pentoo! Linux only; no windows or OSX support (but you’re welcome to try).
To attack multiple WEP, WPA, and WPS encrypted networks in a row. This tool is customizable to be automated with only a few arguments. Wifite aims to be the “set it and forget it” wireless auditing tool.
For help installing any of these programs, see the installation guide (hosted on github)
Download the latest version:
wget -O wifite.py http://wifite.googlecode.com/svn/trunk/wifite.py
change permissions to executable:
chmod +x wifite.py
or, to see a list of commands with info:
successful WEP attack (after 90 seconds):
successful WPS attacks (after 17 hours):
the program contains lots of interactivity (waits for user input). these command-line options are meant to make the program 100% automated — no supervision required.
to crack all WEP access points:
./wifite.py -all -wep
to crack all WPS access points with signal strength greater than (or equal to) 50dB:
./wifite.py -p 50 -wps
to attack all access points, use ‘darkc0de.lst’ for cracking WPA handshakes:
./wifite.py -all –dict /pentest/passwords/wordlists/darkc0de.lst
to attack all WPA access points, but do not try to crack — any captured handshakes are saved automatically:
./wifite.py -all -wpa –dict none
to crack all WEP access points greater than 50dB in strength, giving 5 minutes for each WEP attack method, and send packets at 600 packets/sec:
./wifite.py –pow 50 -wept 300 -pps 600
to attempt to crack WEP-encrypted access point “2WIRE752″ endlessly — program will not stop until key is cracked or user interrrupts with ctrl+C):
./wifite.py -e “2WIRE752″ -wept 0