Correct spelling mistakes.
This commit is contained in:
@@ -3,7 +3,7 @@ FROM python:2.7.14-jessie
|
||||
ENV DEBIAN_FRONTEND noninteractive
|
||||
ENV HASHCAT_VERSION hashcat-3.6.0
|
||||
|
||||
# Intall requirements
|
||||
# Install requirements
|
||||
RUN echo "deb-src http://deb.debian.org/debian jessie main" >> /etc/apt/sources.list
|
||||
RUN apt-get update && apt-get upgrade -y
|
||||
RUN apt-get install ca-certificates gcc openssl make kmod nano wget p7zip build-essential libsqlite3-dev libpcap0.8-dev libpcap-dev sqlite3 pkg-config libnl-genl-3-dev libssl-dev net-tools iw ethtool usbutils pciutils wireless-tools git curl wget unzip macchanger pyrit tshark -y
|
||||
|
||||
4
TODO.md
4
TODO.md
@@ -11,7 +11,7 @@ When a dependency is not found, Wifite should walk the user through installing a
|
||||
|
||||
The dependency-installation walkthrough should provide or auto-execute the install commands (`git clone`, `wget | tar && ./config`, etc).
|
||||
|
||||
Since we have a Python script for every dependency (under `wifite/tools/` or `wifite/util/`), we use Python's multiple-inheritance to achive this.
|
||||
Since we have a Python script for every dependency (under `wifite/tools/` or `wifite/util/`), we use Python's multiple-inheritance to achieve this.
|
||||
|
||||
Requirements:
|
||||
|
||||
@@ -243,7 +243,7 @@ Not "/py":
|
||||
|
||||
**AIRCRACK**
|
||||
* Start aircrack-ng for WEP: Needs pcap file with IVS
|
||||
* Start aircrack-ng for WPA: Needs pcap file containig Handshake
|
||||
* Start aircrack-ng for WPA: Needs pcap file containing Handshake
|
||||
* Check status of aircrack-ng (`percenage`, `keys-tried`)
|
||||
* Return cracked key
|
||||
|
||||
|
||||
@@ -29,7 +29,7 @@ class AttackWEP(Attack):
|
||||
'''
|
||||
Initiates full WEP attack.
|
||||
Including airodump-ng starting, cracking, etc.
|
||||
Returns: True if attack is succesful, false otherwise
|
||||
Returns: True if attack is successful, false otherwise
|
||||
'''
|
||||
|
||||
aircrack = None # Aircrack process, not started yet
|
||||
@@ -340,7 +340,7 @@ class AttackWEP(Attack):
|
||||
'''
|
||||
Attempts to fake-authenticate with target.
|
||||
Returns: True if successful,
|
||||
False is unsuccesful.
|
||||
False is unsuccessful.
|
||||
'''
|
||||
Color.p('\r{+} attempting {G}fake-authentication{W} with {C}%s{W}...' % self.target.bssid)
|
||||
fakeauth = Aireplay.fakeauth(self.target, timeout=AttackWEP.fakeauth_wait)
|
||||
@@ -349,7 +349,7 @@ class AttackWEP(Attack):
|
||||
else:
|
||||
Color.pl(' {R}failed{W}')
|
||||
if Configuration.require_fakeauth:
|
||||
# Fakeauth is requried, fail
|
||||
# Fakeauth is required, fail
|
||||
raise Exception(
|
||||
'Fake-authenticate did not complete within' +
|
||||
' %d seconds' % AttackWEP.fakeauth_wait)
|
||||
|
||||
@@ -25,7 +25,7 @@ class AttackWPA(Attack):
|
||||
|
||||
def run(self):
|
||||
'''
|
||||
Initiates full WPA hanshake capture attack.
|
||||
Initiates full WPA handshake capture attack.
|
||||
'''
|
||||
|
||||
# Check if user only wants to run PixieDust attack
|
||||
|
||||
@@ -204,7 +204,7 @@ class Aireplay(Thread, Dependency):
|
||||
if 'Got RELAYED packet' in line:
|
||||
self.status = 'got relayed packet'
|
||||
|
||||
# XX:XX:XX Thats our ARP packet!
|
||||
# XX:XX:XX That's our ARP packet!
|
||||
if 'Thats our ARP packet' in line:
|
||||
self.status = 'relayed packet was our'
|
||||
|
||||
|
||||
@@ -9,7 +9,7 @@ class Dependency(object):
|
||||
for attr_name in cls.required_attr_names:
|
||||
if not attr_name in cls.__dict__:
|
||||
raise NotImplementedError(
|
||||
"Attribute '{}' has not been overriden in class '{}'" \
|
||||
"Attribute '{}' has not been overridden in class '{}'" \
|
||||
.format(attr_name, cls.__name__)
|
||||
)
|
||||
|
||||
|
||||
Reference in New Issue
Block a user