WIfite – Mass WEP/WPA Cracker For BackTrack4

introduction

designed for Backtrack4 RC1 distribution of Ubuntu. Linux only; no windows or osx support.

purpose

to attack multiple WEP and WPA encrypted networks at the same time. this tool is customizable to be automated with only a few arguments. can be trusted to run without supervision.

features

  • sorts targets by power (in dB); cracks closest access points first
  • automatically deauths clients of hidden networks to decloak SSIDs
  • numerous filters to specify exactly what to attack (wep/wpa/both, above certain signal strengths, channels, etc)
  • customizable settings (timeouts, packets/sec, channel, change mac address, etc)
  • all WPA handshakes are backed up to wifite.py’s current directory
  • smart WPA deauthentication — cycles between all clients and broadcast deauths
  • stop any attack with Ctrl+C — options: continue, move onto next target, skip to cracking, or exit
  • switching WEP attack methods does not reset IVs
  • SKA support (untested)
  • displays session summary at exit; shows any cracked keys
  • all passwords saved to log.txt
  • built-in updater: “./wifite.py -upgrade” not automatic

requirements

  • linux operating system,
  • tested working with python 2.4.5 and python 2.5.2; might be compatible with other versions,
  • patched wireless drivers: backtrack4 has many pre-patched wireless drivers,
  • aircrack-ng suite: available via apt: apt-get install aircrack-ng or by clicking here,
  • python-tk module: required for GUI, available via apt: apt-get install python-tk
  • macchanger: not required; also available via apt: apt-get install macchanger
  • pyrit: not required, optionally strips wpa handshake from .cap files

execution

download the latest version:

wget -O wifite.py http://wifite.googlecode.com/svn/trunk/wifite.py

change permissions to executable:

chmod +x wifite.py

execute:

python wifite.py

or, to see a list of commands with info:

./wifite.py -help

snapshot

console mode:

snapshot WIfite - Mass WEP/WPA Cracker For BackTrack4

gui mode (default):

snapshot-gui WIfite - Mass WEP/WPA Cracker For BackTrack4

examples

the program contains lots of interactivity (waits for user input). these command-line options are meant to make the program 100% automated — no supervision required.

to crack all WEP access points:

./wifite.py -all -nowpa

to crack all WEP access points with signal strength greater than (or equal to) 50dB:

./wifite.py -p 50 -nowpa

to attack all access points, use ‘darkc0de.lst’ for cracking WPA handshakes:

./wifite.py -all --dict /pentest/passwords/wordlists/darkc0de.lst

to attack all WPA access points, but do not try to crack — any captured handshakes are saved automatically:

./wifite.py -all -nowpa --dict none

to crack all WEP access points greater than 50dB in strength, giving 15 minutes for each WEP attack method, and send packets at 600 packets/sec:

./wifite.py --power 50 -wepw 15 -pps 600

to attempt to crack WEP-encrypted access point “2WIRE752” endlessly — program will not stop until key is cracked or user interrrupts with ^C):

./wifite.py -e "2WIRE752" -wepw 0

Share this content:

2 comments

comments user
mas0kis

ada masalah la bila nak monitor..masokis dah submit issue..emm… nak tdo da..hehe~

comments user
9W2PJU

ko guna card apa ?

Post Comment