Correct spelling mistakes.
This commit is contained in:
@@ -3,7 +3,7 @@ FROM python:2.7.14-jessie
|
|||||||
ENV DEBIAN_FRONTEND noninteractive
|
ENV DEBIAN_FRONTEND noninteractive
|
||||||
ENV HASHCAT_VERSION hashcat-3.6.0
|
ENV HASHCAT_VERSION hashcat-3.6.0
|
||||||
|
|
||||||
# Intall requirements
|
# Install requirements
|
||||||
RUN echo "deb-src http://deb.debian.org/debian jessie main" >> /etc/apt/sources.list
|
RUN echo "deb-src http://deb.debian.org/debian jessie main" >> /etc/apt/sources.list
|
||||||
RUN apt-get update && apt-get upgrade -y
|
RUN apt-get update && apt-get upgrade -y
|
||||||
RUN apt-get install ca-certificates gcc openssl make kmod nano wget p7zip build-essential libsqlite3-dev libpcap0.8-dev libpcap-dev sqlite3 pkg-config libnl-genl-3-dev libssl-dev net-tools iw ethtool usbutils pciutils wireless-tools git curl wget unzip macchanger pyrit tshark -y
|
RUN apt-get install ca-certificates gcc openssl make kmod nano wget p7zip build-essential libsqlite3-dev libpcap0.8-dev libpcap-dev sqlite3 pkg-config libnl-genl-3-dev libssl-dev net-tools iw ethtool usbutils pciutils wireless-tools git curl wget unzip macchanger pyrit tshark -y
|
||||||
|
|||||||
4
TODO.md
4
TODO.md
@@ -11,7 +11,7 @@ When a dependency is not found, Wifite should walk the user through installing a
|
|||||||
|
|
||||||
The dependency-installation walkthrough should provide or auto-execute the install commands (`git clone`, `wget | tar && ./config`, etc).
|
The dependency-installation walkthrough should provide or auto-execute the install commands (`git clone`, `wget | tar && ./config`, etc).
|
||||||
|
|
||||||
Since we have a Python script for every dependency (under `wifite/tools/` or `wifite/util/`), we use Python's multiple-inheritance to achive this.
|
Since we have a Python script for every dependency (under `wifite/tools/` or `wifite/util/`), we use Python's multiple-inheritance to achieve this.
|
||||||
|
|
||||||
Requirements:
|
Requirements:
|
||||||
|
|
||||||
@@ -243,7 +243,7 @@ Not "/py":
|
|||||||
|
|
||||||
**AIRCRACK**
|
**AIRCRACK**
|
||||||
* Start aircrack-ng for WEP: Needs pcap file with IVS
|
* Start aircrack-ng for WEP: Needs pcap file with IVS
|
||||||
* Start aircrack-ng for WPA: Needs pcap file containig Handshake
|
* Start aircrack-ng for WPA: Needs pcap file containing Handshake
|
||||||
* Check status of aircrack-ng (`percenage`, `keys-tried`)
|
* Check status of aircrack-ng (`percenage`, `keys-tried`)
|
||||||
* Return cracked key
|
* Return cracked key
|
||||||
|
|
||||||
|
|||||||
@@ -29,7 +29,7 @@ class AttackWEP(Attack):
|
|||||||
'''
|
'''
|
||||||
Initiates full WEP attack.
|
Initiates full WEP attack.
|
||||||
Including airodump-ng starting, cracking, etc.
|
Including airodump-ng starting, cracking, etc.
|
||||||
Returns: True if attack is succesful, false otherwise
|
Returns: True if attack is successful, false otherwise
|
||||||
'''
|
'''
|
||||||
|
|
||||||
aircrack = None # Aircrack process, not started yet
|
aircrack = None # Aircrack process, not started yet
|
||||||
@@ -340,7 +340,7 @@ class AttackWEP(Attack):
|
|||||||
'''
|
'''
|
||||||
Attempts to fake-authenticate with target.
|
Attempts to fake-authenticate with target.
|
||||||
Returns: True if successful,
|
Returns: True if successful,
|
||||||
False is unsuccesful.
|
False is unsuccessful.
|
||||||
'''
|
'''
|
||||||
Color.p('\r{+} attempting {G}fake-authentication{W} with {C}%s{W}...' % self.target.bssid)
|
Color.p('\r{+} attempting {G}fake-authentication{W} with {C}%s{W}...' % self.target.bssid)
|
||||||
fakeauth = Aireplay.fakeauth(self.target, timeout=AttackWEP.fakeauth_wait)
|
fakeauth = Aireplay.fakeauth(self.target, timeout=AttackWEP.fakeauth_wait)
|
||||||
@@ -349,7 +349,7 @@ class AttackWEP(Attack):
|
|||||||
else:
|
else:
|
||||||
Color.pl(' {R}failed{W}')
|
Color.pl(' {R}failed{W}')
|
||||||
if Configuration.require_fakeauth:
|
if Configuration.require_fakeauth:
|
||||||
# Fakeauth is requried, fail
|
# Fakeauth is required, fail
|
||||||
raise Exception(
|
raise Exception(
|
||||||
'Fake-authenticate did not complete within' +
|
'Fake-authenticate did not complete within' +
|
||||||
' %d seconds' % AttackWEP.fakeauth_wait)
|
' %d seconds' % AttackWEP.fakeauth_wait)
|
||||||
|
|||||||
@@ -25,7 +25,7 @@ class AttackWPA(Attack):
|
|||||||
|
|
||||||
def run(self):
|
def run(self):
|
||||||
'''
|
'''
|
||||||
Initiates full WPA hanshake capture attack.
|
Initiates full WPA handshake capture attack.
|
||||||
'''
|
'''
|
||||||
|
|
||||||
# Check if user only wants to run PixieDust attack
|
# Check if user only wants to run PixieDust attack
|
||||||
|
|||||||
@@ -204,7 +204,7 @@ class Aireplay(Thread, Dependency):
|
|||||||
if 'Got RELAYED packet' in line:
|
if 'Got RELAYED packet' in line:
|
||||||
self.status = 'got relayed packet'
|
self.status = 'got relayed packet'
|
||||||
|
|
||||||
# XX:XX:XX Thats our ARP packet!
|
# XX:XX:XX That's our ARP packet!
|
||||||
if 'Thats our ARP packet' in line:
|
if 'Thats our ARP packet' in line:
|
||||||
self.status = 'relayed packet was our'
|
self.status = 'relayed packet was our'
|
||||||
|
|
||||||
|
|||||||
@@ -9,7 +9,7 @@ class Dependency(object):
|
|||||||
for attr_name in cls.required_attr_names:
|
for attr_name in cls.required_attr_names:
|
||||||
if not attr_name in cls.__dict__:
|
if not attr_name in cls.__dict__:
|
||||||
raise NotImplementedError(
|
raise NotImplementedError(
|
||||||
"Attribute '{}' has not been overriden in class '{}'" \
|
"Attribute '{}' has not been overridden in class '{}'" \
|
||||||
.format(attr_name, cls.__name__)
|
.format(attr_name, cls.__name__)
|
||||||
)
|
)
|
||||||
|
|
||||||
|
|||||||
Reference in New Issue
Block a user