derv82
dd7e93666a
Cleaning up PMKID attack.
2018-08-16 01:23:35 -07:00
derv82
936230dd50
Added PMKID attack. Simplified attack-loop.
2018-08-16 01:23:35 -07:00
derv82
0d44a6bc3d
Fix bug in dependency failure.
2018-08-16 01:23:35 -07:00
derv82
305d6b9e3b
Cleaning up wifite.py, added wordlist.
...
Moved logic from main module into helper classes.
Wordlist from https://github.com/berzerk0/Probable-Wordlists/tree/master/Real-Passwords/WPA-Length
2018-08-16 01:23:35 -07:00
derv82
c335391bca
Only depend on 'aicrack' to avoid messages for entire air* suite.
2018-08-16 01:23:35 -07:00
derv82
f24ec55999
Silently ignore failure to kill conflicting processes.
...
Resolves #97
2018-06-09 22:48:10 -04:00
derv82
9d1db5966b
Change shebang from /usr/bin/python to /usr/bin/env python
...
Resolves #99
2018-06-09 22:46:30 -04:00
derv
4061bb9618
Merge pull request #96 from ChunshengZhao/master
...
[wpa.py] Fixed TypeError in python3
2018-06-09 19:35:55 -07:00
derv
d7fcda0d8c
Merge pull request #94 from EdwardBetts/spelling
...
Correct spelling mistakes.
2018-06-09 19:35:16 -07:00
derv82
1edba23c32
2.1.6: Support non-ASCII ESSIDs in scanner. Don't silently exit on crash.
...
Resolves #88
Resolves #92
Might be related to #85
2018-06-09 22:22:38 -04:00
ZhaoChunsheng
92917a4bbd
[wpa.py] Fixed TypeError in python3
...
"TypeError: cannot use a string pattern on a bytes-like object"
The exception only happens in python3, python2 is all right.
2018-06-09 22:40:51 +08:00
Edward Betts
feb9dafa16
Correct spelling mistakes.
2018-06-08 20:32:50 +01:00
derv82
96e846aa82
Removing EvilTwin-related dependencies
...
Resolves #89
2018-05-27 20:27:37 -04:00
derv82
72fc0b27a1
2.1.5 version bump for recent changes.
2018-05-27 17:16:11 -04:00
derv82
9a12e38dda
Dependency cleanup
2018-04-21 11:36:39 -04:00
derv82
0adcd55742
All tools inherit "Dependency".
2018-04-21 11:34:30 -04:00
derv82
1083db6f88
Add eviltwin args. Add "Dependency" subclass
2018-04-21 04:25:46 -04:00
derv82
28b2d8312c
--keep-ivs option to retain .ivs files across attacks on the same target
...
For #27
2018-04-20 14:57:31 -04:00
derv82
9f95f554ae
Lots of changes to improve WEP, but don't actually improve WEP.
2018-04-19 22:49:59 -04:00
derv82
adc7d37318
Don't kill+restart aircrack after 30s, wait 60s for target,
...
Also detect enabled/disabled interfaces when putting in/out of monitor mode.
2018-04-19 12:59:11 -04:00
derv82
1bbc7fefaf
Better colors on stack traces
2018-04-19 02:50:25 -04:00
derv82
4ef3236e4d
Don't disable monitor mode / put interface up on exit.
2018-04-18 21:36:36 -04:00
derv82
bd495966f0
v2.1.4: Version bump for recent fixes/changes.
2018-04-18 15:03:34 -04:00
derv82
6f71957753
iface before PHY in output.
...
Remove "Interface" model, rely on ifconfig
2018-04-18 15:01:25 -04:00
derv82
ec49c0336e
Change all *.py to exectuable
2018-04-18 14:44:56 -04:00
derv82
2b40ce3706
Code cleanup
2018-04-18 14:42:24 -04:00
derv82
8f32972546
Fix bug in macchanger
2018-04-18 06:16:53 -04:00
derv82
3542381b3e
Move Ifconfig and Iwconfig logic to separate classes.
2018-04-18 06:15:14 -04:00
derv82
42781dedcc
Added Airmon-ng test.
2018-04-15 23:10:47 -04:00
derv82
90c99b11f1
2.1.3: Better WPS attack messaging. Leave device in Monitor Mode.
...
Unrelated to WPS:
* Do not take device out of monitor mode when finished (informs user)
* Do not restart NetworkManager when finished (informs user)
Changes to CLI switches:
* --wps-time X: Total time for WPS attack to complete
* --wps-timeouts X: Max number of timeouts before failing
* --wps-fails X: Max number of WPSFails before failing
* Removed unused WPS switches.
* Improved --help messaging for WPS switches.
* Fail/Timeout threshold default is 100
Bully now outputs useful information:
* Current PIN + status
* Time remaining
* Number of Timeout messages
* Number of "WPSFail" messages
* If AP is locked
Better reaver output.
* Looks more like Bully's output.
* Timer shows time remaining for attack.
* Mentions "Running pixiewps" during "M2 message" step.
* pixiewps failure looks like this: "Reaver says: 'WPS pin not found'"
* Counts Timeouts and "WPS Transaction Failure" (WPSFail)
For #28
2018-04-07 19:22:51 -04:00
derv82
20ea673a3d
2.1.2: Quiet decloak. Support ESSIDs with commas and trailing spaces
...
Decloaked ESSIDs will have a "*" next to their name. For #78
While testing, I found that Wifite did not parse Airodump's CSV correctly.
Specifically, ESSIDs with commas or trailing spaces.
Fixed in this commit.
Also fixed hidden ESSID detection introduced by the new CSV parsing logic.
2018-04-06 18:56:35 -04:00
derv82
cef4c451fe
Better help messages for -v and -i
2018-04-06 17:29:09 -04:00
derv82
2b7870cb7c
2.1.1: Option to ignore APs without clients (--clients-only or -co)
...
Requested in #79
2018-04-06 17:27:43 -04:00
derv82
b716e6099f
Don't specify reaver timeout (was 4s, default is 10s)
2018-04-06 16:21:30 -04:00
derv82
e0ec0e72b2
Change version to 2.1.0
...
See https://github.com/derv82/wifite/issues/130 for more info.
2018-04-06 15:55:58 -04:00
derv82
699578abed
Allow spaces in target selection (e.g. 3, 4, 7-8)
2018-04-01 15:57:58 -04:00
derv82
57ad097d49
--check: Detect BSSID based on Wifite's handshake filename format.
2018-04-01 15:31:12 -04:00
derv82
a4110b4cf9
Put quotes around Tshark filter ... otherwise tshark locks up
2018-04-01 15:23:56 -04:00
derv82
e8c0843bdf
Use stdbuf only if it exists
2018-04-01 01:09:57 -04:00
derv82
5db801b414
Cleaning up handshake code
2018-04-01 01:03:10 -04:00
derv82
2cd6116a8c
Move Pyrit logic to tools/pyrit.py
2018-04-01 00:55:41 -04:00
derv82
a2dbf4c382
Moving Tshark logic into /tools/tshark.py
...
Added tests for analyzing handshakes
2018-04-01 00:37:28 -04:00
derv82
acc8e296d5
Dim the [+] box colors
2018-03-31 23:59:50 -04:00
derv82
3eddcaa59f
Support for Python3
...
That was fun.
2018-03-31 23:02:33 -04:00
derv82
1ad17472b2
Tshark is optional, falls-back to Wash for WPS-detection.
...
Should resolve #77
2018-03-31 18:57:11 -04:00
derv82
528741f89f
Fix bully: --force when deriving PSK from PIN
2018-03-31 18:40:04 -04:00
derv82
909b10e517
Make tshark non-required.
...
* WPS-detection is not required for non-WPS attacks.
* Handshake analysis can be done using aircrack, cowpatty, pyrit, etc.
2018-03-31 18:05:47 -04:00
derv82
b0bd57b1a3
Improve messaging during chopchop & fragment attacks
...
Bugfix when chopchop fails.
Displays aircrack's error message when chopchop fails.
For improving WEP attacks in #27
2018-03-25 16:03:20 -04:00
derv82
19c38bd06c
Fetch PSK when reaver fails to find it using Bully
...
Also changed reaver --timeout from 10 seconds (default) to 4 seconds.
Resolves #76
2018-03-24 15:02:11 -04:00
derv82
a488cf86f1
Bugfix: Don't infinitely loop while calculating Hex & ASCII key from WEP attack.
...
* Simplified HEX/ASCII conversion. Avoids infinite loop 🤔
* Added integration test: python -m wifite.tools.aircrack
Should resolve "hanging" issues during WEP attacks such as #27 .
2018-03-24 14:10:48 -04:00