Files
wifite2/py/Arguments.py
derv82 1078a4d5de Crack results can be saved or loaded.
Although they're not saved or loaded at this time. :(
Also, BANNER!
2015-06-04 00:52:36 -07:00

224 lines
8.1 KiB
Python

#!/usr/bin/python
import argparse
class Arguments(object):
''' Holds arguments used by the Wifite '''
def __init__(self, Configuration):
self.args = self.get_arguments(Configuration)
def get_arguments(self, Configuration):
''' Returns parser.args() containing all program arguments '''
description = 'Wrapper script around aircrack-ng and reaver'
description += ' https://github.com/derv82/wifite2'
parser = argparse.ArgumentParser(
description=description,
usage=argparse.SUPPRESS)
# Global variables
glob = parser.add_argument_group('SETTINGS')
glob.add_argument('-i',
action='store',
dest='interface',
metavar='[interface]',
type=str,
help='Wireless interface to use (default: ask)')
glob.add_argument('-c',
action='store',
dest='channel',
metavar='[channel]',
type=int,
help='Wireless channel to scan (default: all channels)')
glob.add_argument('-b',
action='store',
dest='target_bssid',
metavar='[bssid]',
type=str,
help='BSSID (e.g. AA:BB:CC:DD:EE:FF) of access point to attack')
glob.add_argument('-e',
action='store',
dest='target_essid',
metavar='[essid]',
type=str,
help='ESSID (name) of access point to attack')
# WEP
wep = parser.add_argument_group('WEP-RELATED')
wep.add_argument('--wep',
action='store_true',
dest='wep_filter',
help='Filter to display WEP-encrypted networks (default: off)')
wep.add_argument('--require-fakeauth',
action='store_true',
dest='require_fakeauth',
help='Fails attacks if fake-auth fails (default: off)')
wep.add_argument('-pps',
action='store',
dest='wep_pps',
metavar='[pps]',
type=int,
help='Packets Per Second to replay (default: %d pps)'
% Configuration.wep_pps)
wep.add_argument('-wept',
action='store',
dest='wep_timeout',
metavar='[seconds]',
type=int,
help='Seconds to wait before failing (default: %d ivs)'
% Configuration.wep_timeout)
wep.add_argument('-wepc',
action='store',
dest='wep_crack_at_ivs',
metavar='[ivs]',
type=int,
help='Start cracking at this many IVs (default: %d ivs)'
% Configuration.wep_crack_at_ivs)
wep.add_argument('-weprs',
action='store',
dest='wep_restart_stale_ivs',
metavar='[seconds]',
type=int,
help='Restart aireplay if no new IVs appear (default: %ds)'
% Configuration.wep_restart_stale_ivs)
wep.add_argument('-weprc',
action='store',
dest='wep_restart_aircrack',
metavar='[seconds]',
type=int,
help='Restart aircrack after this delay (default: %ds)'
% Configuration.wep_restart_aircrack)
# WPA
wpa = parser.add_argument_group('WPA-RELATED')
wpa.add_argument('--wpa',
action='store_true',
dest='wpa_filter',
help='Filter to display WPA-encrypted networks (includes WPS)')
wpa.add_argument('-wpadt',
action='store',
dest='wpa_deauth_timeout',
metavar='[seconds]',
type=int,
help='Time to wait before failing a Deauth (default: %ds)'
% Configuration.wpa_deauth_timeout)
wpa.add_argument('-wpat',
action='store',
dest='wpa_attack_timeout',
metavar='[seconds]',
type=int,
help='Time to wait before failing WPA attack (default: %ds)'
% Configuration.wpa_attack_timeout)
wpa.add_argument('-hs',
action='store',
dest='wpa_handshake_dir',
metavar='[dir]',
type=str,
help='Directory to store handshake files (default: %s)'
% Configuration.wpa_handshake_dir)
wpa.add_argument('--dict',
action='store',
dest='wordlist',
metavar='[file]',
type=str,
help='File containing passwords for cracking (default: %s)'
% Configuration.wordlist)
# WPS
wps = parser.add_argument_group('WPS-RELATED')
wps.add_argument('--wps',
action='store_true',
dest='wps_filter',
help='Filter to display WPS-enabled networks')
wps.add_argument('--reaver',
action='store_true',
dest='reaver_only',
help='ONLY use Reaver on WPS networks (default: off)')
wps.add_argument('--no-reaver',
action='store_true',
dest='no_reaver',
help='Do NOT use Reaver on WPS networks (default: off)')
wps.add_argument('--pixie',
action='store_true',
dest='pixie_only',
help='Only use the WPS Pixie-Dust attack (default: off)')
wps.add_argument('--pixiet',
action='store',
dest='wps_pixie_timeout',
metavar='[seconds]',
type=int,
help='Time to wait before stopping PixieDust (default: %ds)'
% Configuration.wps_pixie_timeout)
wps.add_argument('-wpst',
action='store',
dest='wps_pin_timeout',
metavar='[seconds]',
type=int,
help='Time to wait before stopping PIN attack (default: %ds)'
% Configuration.wps_pin_timeout)
wps.add_argument('-wpsmr',
action='store',
dest='wps_max_retries',
metavar='[retries]',
type=int,
help='Maximum number of Retries before stopping (default: %d)'
% Configuration.wps_max_retries)
wps.add_argument('-wpsmf',
action='store',
dest='wps_fail_threshold',
metavar='[fails]',
type=int,
help='Maximum number of Failures before stopping (default: %d)'
% Configuration.wps_fail_threshold)
wps.add_argument('-wpsmt',
action='store',
dest='wps_timeout_threshold',
metavar='[timeouts]',
type=int,
help='Maximum number of Timeouts before stopping (default: %d)'
% Configuration.wps_timeout_threshold)
wps.add_argument('--ignore-ratelimit',
action='store_false',
dest='wps_ignore_rate_limit',
help='Continues attack if WPS is rate-limited (default: off)')
# Commands
commands = parser.add_argument_group('COMMANDS')
commands.add_argument('--cracked',
action='store_true',
dest='cracked',
help='Display previously-cracked access points')
commands.add_argument('--check-hs',
action='store',
metavar='[file]',
dest='check_handshake',
help='Check a .cap file for WPA handshakes')
commands.add_argument('--crack-wpa',
action='store',
type=str,
dest='crack_wpa',
metavar='[file]',
help='Crack a .cap file containing a WPA handshake')
commands.add_argument('--crack-wep',
action='store',
type=str,
dest='crack_wep',
metavar='[file]',
help='Crack a .cap file containing WEP IVS')
commands.add_argument('--update',
action='store_true',
dest='update',
help='Update to latest version of Wifite (on github)')
return parser.parse_args()
if __name__ == '__main__':
from Color import Color
from Configuration import Configuration
Configuration.initialize()
a = Arguments(Configuration)
args = a.args
for (key,value) in sorted(args.__dict__.iteritems()):
Color.pl('{C}%s: {G}%s{W}' % (key.ljust(21),value))