Wifite
Wifite is a Python script that automates wireless auditing of WEP or WPA encrypted networks using aircrack-ng tools. It targets access points with customizable attacks including WPS, PMKID, and handshake capture.
Description
Wifite is designed to audit WEP or WPA encrypted wireless networks by automating the use of tools like aircrack-ng, pyrit, reaver, and tshark. It simplifies wireless security testing with minimal arguments and can run unsupervised, making it ideal for penetration testers auditing access points.
The tool supports targeting specific network types such as WEP, WPA/WPA2/WPA3, WPS-enabled, and OWE networks. It offers flexibility through options for scan time, power thresholds, interface selection, and attack modes, allowing users to focus on high-signal or vulnerable targets.
Use cases include automated scanning and attacking of wireless networks during security assessments, checking captured handshakes, and managing cracked or ignored access points. It integrates with Kali Linux dependencies for comprehensive wireless auditing.
How It Works
Wifite operates by enabling monitor mode on wireless interfaces, scanning for targets using airodump-ng, and applying attacks based on flags: WEP cracking with fake authentication and IVS reuse; WPA handshake capture for dictionary attacks; WPS PIN/Pixie-Dust via reaver/bully; PMKID capture without association. It kills conflicting processes, randomizes MAC if specified, filters by power/channel, and supports infinite scanning or timed attacks. Outputs include captured files for offline cracking with tools like aircrack-ng.
Installation
sudo apt install wifiteFlags
Examples
wifite -pow 50 -wpswifite -hwifite --crackedwifite --ignoredwifite --check [file]wifite --crackwifite --update-db