diff --git a/Dockerfile b/Dockerfile index ad56793..2d956ba 100644 --- a/Dockerfile +++ b/Dockerfile @@ -3,7 +3,7 @@ FROM python:2.7.14-jessie ENV DEBIAN_FRONTEND noninteractive ENV HASHCAT_VERSION hashcat-3.6.0 -# Intall requirements +# Install requirements RUN echo "deb-src http://deb.debian.org/debian jessie main" >> /etc/apt/sources.list RUN apt-get update && apt-get upgrade -y RUN apt-get install ca-certificates gcc openssl make kmod nano wget p7zip build-essential libsqlite3-dev libpcap0.8-dev libpcap-dev sqlite3 pkg-config libnl-genl-3-dev libssl-dev net-tools iw ethtool usbutils pciutils wireless-tools git curl wget unzip macchanger pyrit tshark -y diff --git a/TODO.md b/TODO.md index a458b72..d86df7d 100644 --- a/TODO.md +++ b/TODO.md @@ -11,7 +11,7 @@ When a dependency is not found, Wifite should walk the user through installing a The dependency-installation walkthrough should provide or auto-execute the install commands (`git clone`, `wget | tar && ./config`, etc). -Since we have a Python script for every dependency (under `wifite/tools/` or `wifite/util/`), we use Python's multiple-inheritance to achive this. +Since we have a Python script for every dependency (under `wifite/tools/` or `wifite/util/`), we use Python's multiple-inheritance to achieve this. Requirements: @@ -243,7 +243,7 @@ Not "/py": **AIRCRACK** * Start aircrack-ng for WEP: Needs pcap file with IVS -* Start aircrack-ng for WPA: Needs pcap file containig Handshake +* Start aircrack-ng for WPA: Needs pcap file containing Handshake * Check status of aircrack-ng (`percenage`, `keys-tried`) * Return cracked key diff --git a/wifite/attack/wep.py b/wifite/attack/wep.py index f229fa1..6e9ba7d 100755 --- a/wifite/attack/wep.py +++ b/wifite/attack/wep.py @@ -29,7 +29,7 @@ class AttackWEP(Attack): ''' Initiates full WEP attack. Including airodump-ng starting, cracking, etc. - Returns: True if attack is succesful, false otherwise + Returns: True if attack is successful, false otherwise ''' aircrack = None # Aircrack process, not started yet @@ -340,7 +340,7 @@ class AttackWEP(Attack): ''' Attempts to fake-authenticate with target. Returns: True if successful, - False is unsuccesful. + False is unsuccessful. ''' Color.p('\r{+} attempting {G}fake-authentication{W} with {C}%s{W}...' % self.target.bssid) fakeauth = Aireplay.fakeauth(self.target, timeout=AttackWEP.fakeauth_wait) @@ -349,7 +349,7 @@ class AttackWEP(Attack): else: Color.pl(' {R}failed{W}') if Configuration.require_fakeauth: - # Fakeauth is requried, fail + # Fakeauth is required, fail raise Exception( 'Fake-authenticate did not complete within' + ' %d seconds' % AttackWEP.fakeauth_wait) diff --git a/wifite/attack/wpa.py b/wifite/attack/wpa.py index 5403c4f..658f826 100755 --- a/wifite/attack/wpa.py +++ b/wifite/attack/wpa.py @@ -25,7 +25,7 @@ class AttackWPA(Attack): def run(self): ''' - Initiates full WPA hanshake capture attack. + Initiates full WPA handshake capture attack. ''' # Check if user only wants to run PixieDust attack diff --git a/wifite/tools/aireplay.py b/wifite/tools/aireplay.py index 5806232..ef012de 100755 --- a/wifite/tools/aireplay.py +++ b/wifite/tools/aireplay.py @@ -204,7 +204,7 @@ class Aireplay(Thread, Dependency): if 'Got RELAYED packet' in line: self.status = 'got relayed packet' - # XX:XX:XX Thats our ARP packet! + # XX:XX:XX That's our ARP packet! if 'Thats our ARP packet' in line: self.status = 'relayed packet was our' diff --git a/wifite/tools/dependency.py b/wifite/tools/dependency.py index d575f57..598f34b 100644 --- a/wifite/tools/dependency.py +++ b/wifite/tools/dependency.py @@ -9,7 +9,7 @@ class Dependency(object): for attr_name in cls.required_attr_names: if not attr_name in cls.__dict__: raise NotImplementedError( - "Attribute '{}' has not been overriden in class '{}'" \ + "Attribute '{}' has not been overridden in class '{}'" \ .format(attr_name, cls.__name__) )