WIfite – Mass WEP/WPA Cracker For BackTrack4
introduction
designed for Backtrack4 RC1 distribution of Ubuntu. Linux only; no windows or osx support.
purpose
to attack multiple WEP and WPA encrypted networks at the same time. this tool is customizable to be automated with only a few arguments. can be trusted to run without supervision.
features
- sorts targets by power (in dB); cracks closest access points first
- automatically deauths clients of hidden networks to decloak SSIDs
- numerous filters to specify exactly what to attack (wep/wpa/both, above certain signal strengths, channels, etc)
- customizable settings (timeouts, packets/sec, channel, change mac address, etc)
- all WPA handshakes are backed up to wifite.py’s current directory
- smart WPA deauthentication — cycles between all clients and broadcast deauths
- stop any attack with Ctrl+C — options: continue, move onto next target, skip to cracking, or exit
- switching WEP attack methods does not reset IVs
- SKA support (untested)
- displays session summary at exit; shows any cracked keys
- all passwords saved to log.txt
- built-in updater: “./wifite.py -upgrade” not automatic
requirements
- linux operating system,
- tested working with python 2.4.5 and python 2.5.2; might be compatible with other versions,
- patched wireless drivers: backtrack4 has many pre-patched wireless drivers,
- aircrack-ng suite: available via apt: apt-get install aircrack-ng or by clicking here,
- python-tk module: required for GUI, available via apt: apt-get install python-tk
- macchanger: not required; also available via apt: apt-get install macchanger
- pyrit: not required, optionally strips wpa handshake from .cap files
execution
download the latest version:
wget -O wifite.py http://wifite.googlecode.com/svn/trunk/wifite.py
change permissions to executable:
chmod +x wifite.py
execute:
python wifite.py
or, to see a list of commands with info:
./wifite.py -help
snapshot
console mode:
gui mode (default):
examples
the program contains lots of interactivity (waits for user input). these command-line options are meant to make the program 100% automated — no supervision required.
to crack all WEP access points:
./wifite.py -all -nowpa
to crack all WEP access points with signal strength greater than (or equal to) 50dB:
./wifite.py -p 50 -nowpa
to attack all access points, use ‘darkc0de.lst’ for cracking WPA handshakes:
./wifite.py -all --dict /pentest/passwords/wordlists/darkc0de.lst
to attack all WPA access points, but do not try to crack — any captured handshakes are saved automatically:
./wifite.py -all -nowpa --dict none
to crack all WEP access points greater than 50dB in strength, giving 15 minutes for each WEP attack method, and send packets at 600 packets/sec:
./wifite.py --power 50 -wepw 15 -pps 600
to attempt to crack WEP-encrypted access point “2WIRE752” endlessly — program will not stop until key is cracked or user interrrupts with ^C):
./wifite.py -e "2WIRE752" -wepw 0
Share this content:
2 comments