Merge pull request #94 from EdwardBetts/spelling

Correct spelling mistakes.
This commit is contained in:
derv
2018-06-09 19:35:16 -07:00
committed by GitHub
6 changed files with 9 additions and 9 deletions

View File

@@ -3,7 +3,7 @@ FROM python:2.7.14-jessie
ENV DEBIAN_FRONTEND noninteractive ENV DEBIAN_FRONTEND noninteractive
ENV HASHCAT_VERSION hashcat-3.6.0 ENV HASHCAT_VERSION hashcat-3.6.0
# Intall requirements # Install requirements
RUN echo "deb-src http://deb.debian.org/debian jessie main" >> /etc/apt/sources.list RUN echo "deb-src http://deb.debian.org/debian jessie main" >> /etc/apt/sources.list
RUN apt-get update && apt-get upgrade -y RUN apt-get update && apt-get upgrade -y
RUN apt-get install ca-certificates gcc openssl make kmod nano wget p7zip build-essential libsqlite3-dev libpcap0.8-dev libpcap-dev sqlite3 pkg-config libnl-genl-3-dev libssl-dev net-tools iw ethtool usbutils pciutils wireless-tools git curl wget unzip macchanger pyrit tshark -y RUN apt-get install ca-certificates gcc openssl make kmod nano wget p7zip build-essential libsqlite3-dev libpcap0.8-dev libpcap-dev sqlite3 pkg-config libnl-genl-3-dev libssl-dev net-tools iw ethtool usbutils pciutils wireless-tools git curl wget unzip macchanger pyrit tshark -y

View File

@@ -11,7 +11,7 @@ When a dependency is not found, Wifite should walk the user through installing a
The dependency-installation walkthrough should provide or auto-execute the install commands (`git clone`, `wget | tar && ./config`, etc). The dependency-installation walkthrough should provide or auto-execute the install commands (`git clone`, `wget | tar && ./config`, etc).
Since we have a Python script for every dependency (under `wifite/tools/` or `wifite/util/`), we use Python's multiple-inheritance to achive this. Since we have a Python script for every dependency (under `wifite/tools/` or `wifite/util/`), we use Python's multiple-inheritance to achieve this.
Requirements: Requirements:
@@ -243,7 +243,7 @@ Not "/py":
**AIRCRACK** **AIRCRACK**
* Start aircrack-ng for WEP: Needs pcap file with IVS * Start aircrack-ng for WEP: Needs pcap file with IVS
* Start aircrack-ng for WPA: Needs pcap file containig Handshake * Start aircrack-ng for WPA: Needs pcap file containing Handshake
* Check status of aircrack-ng (`percenage`, `keys-tried`) * Check status of aircrack-ng (`percenage`, `keys-tried`)
* Return cracked key * Return cracked key

View File

@@ -29,7 +29,7 @@ class AttackWEP(Attack):
''' '''
Initiates full WEP attack. Initiates full WEP attack.
Including airodump-ng starting, cracking, etc. Including airodump-ng starting, cracking, etc.
Returns: True if attack is succesful, false otherwise Returns: True if attack is successful, false otherwise
''' '''
aircrack = None # Aircrack process, not started yet aircrack = None # Aircrack process, not started yet
@@ -340,7 +340,7 @@ class AttackWEP(Attack):
''' '''
Attempts to fake-authenticate with target. Attempts to fake-authenticate with target.
Returns: True if successful, Returns: True if successful,
False is unsuccesful. False is unsuccessful.
''' '''
Color.p('\r{+} attempting {G}fake-authentication{W} with {C}%s{W}...' % self.target.bssid) Color.p('\r{+} attempting {G}fake-authentication{W} with {C}%s{W}...' % self.target.bssid)
fakeauth = Aireplay.fakeauth(self.target, timeout=AttackWEP.fakeauth_wait) fakeauth = Aireplay.fakeauth(self.target, timeout=AttackWEP.fakeauth_wait)
@@ -349,7 +349,7 @@ class AttackWEP(Attack):
else: else:
Color.pl(' {R}failed{W}') Color.pl(' {R}failed{W}')
if Configuration.require_fakeauth: if Configuration.require_fakeauth:
# Fakeauth is requried, fail # Fakeauth is required, fail
raise Exception( raise Exception(
'Fake-authenticate did not complete within' + 'Fake-authenticate did not complete within' +
' %d seconds' % AttackWEP.fakeauth_wait) ' %d seconds' % AttackWEP.fakeauth_wait)

View File

@@ -25,7 +25,7 @@ class AttackWPA(Attack):
def run(self): def run(self):
''' '''
Initiates full WPA hanshake capture attack. Initiates full WPA handshake capture attack.
''' '''
# Check if user only wants to run PixieDust attack # Check if user only wants to run PixieDust attack

View File

@@ -204,7 +204,7 @@ class Aireplay(Thread, Dependency):
if 'Got RELAYED packet' in line: if 'Got RELAYED packet' in line:
self.status = 'got relayed packet' self.status = 'got relayed packet'
# XX:XX:XX Thats our ARP packet! # XX:XX:XX That's our ARP packet!
if 'Thats our ARP packet' in line: if 'Thats our ARP packet' in line:
self.status = 'relayed packet was our' self.status = 'relayed packet was our'

View File

@@ -9,7 +9,7 @@ class Dependency(object):
for attr_name in cls.required_attr_names: for attr_name in cls.required_attr_names:
if not attr_name in cls.__dict__: if not attr_name in cls.__dict__:
raise NotImplementedError( raise NotImplementedError(
"Attribute '{}' has not been overriden in class '{}'" \ "Attribute '{}' has not been overridden in class '{}'" \
.format(attr_name, cls.__name__) .format(attr_name, cls.__name__)
) )