909b10e517b49d51e8e64c3c4977ea69471d47a2
* WPS-detection is not required for non-WPS attacks. * Handshake analysis can be done using aircrack, cowpatty, pyrit, etc.
Wifite 2
A complete re-write of wifite, a Python script for auditing wireless networks.
What's new?
- Cleaner process management -- No longer leaves processes running in the background.
- UX: Target access points are refreshed every second instead of every 5 seconds.
- UX: Displays realtime Power level (in db) of currently-attacked target
- No more WPS PIN attack (which can take days on-average). But the Pixie-Dust attack is still around.
- Development: Lots of files instead of "one big script".
What's not new?
- Backwards compatibility with the original
wifite's arguments. - Same text-based interface everyone knows and loves.
Brief Feature List
- Reaver Pixie-Dust attack (
--wps-only) - WPA handshake capture (
--no-wps) - Validates handshakes against
pyrit,tshark,cowpatty, andaircrack-ng - Various WEP attacks (replay, chopchop, fragment, etc)
- 5Ghz support for wireless cards that support 5ghz (use
-5option) - Stores cracked passwords and handshakes to the current directory, with metadata about the access point (via
--crackedcommand). - Decloaks hidden access points when channel is fixed (use
-c <channel>option) - Provides commands to crack captured WPA handshakes (via
--crackcommand)
Support
Wifite2 is designed entirely for the latest version of Kali Rolling release (tested on Kali 2017.2, updated Jan 2018).
This means only the latest versions of these programs are supported: Aircrack-ng suite, reaver, tshark, cowpatty.
Other pen-testing distributions (such as BackBox) have outdated versions of these suites; these distributions are not supported.
Installing & Running
git clone https://github.com/derv82/wifite2.git
cd wifite2
./Wifite.py
Screenshots
Decloaking & cracking a hidden access point (via the WPA Handshake attack):

Cracking a weak WEP password (using the WEP Replay attack):

Description
Languages
Python
99.3%
Dockerfile
0.7%
