Wifite包装说明
要攻击多个WEP,WPA和WPS加密网络在一排。这个工具是可定制的,以与仅几个参数是自动的。 Wifite的目标是成为“设置它和忘记它”无线审计工具。
产品特点:
- 通过排序的信号强度(单位为dB)的目标;裂缝最近的接入点第一
- 自动去验证隐秘的网络来显示的SSID的客户
- 众多的过滤器来精确指定攻击是什么(WEP / WPA /两个,超过一定的信号强度,频道等)
- 自定义设置(超时,数据包/秒,等等)
- “匿名”功能;修改MAC以攻击前的随机地址,然后更改回来的时候攻击是完整的
- 所有捕获的WPA握手都备份到wifite.py当前目录
- 智能WPA解除认证;所有客户端和广播deauths之间的周期
- 停止使用Ctrl + C的任何攻击,以选择继续,移动到下一个目标,跳到开裂,或退出
- 显示在退出会议纪要;显示有任何破解密钥
- 所有密码保存到cracked.txt
资料来源:https://code.google.com/p/wifite/
Wifite首页 | 卡利Wifite回购
- 作者:柴油merkler
- 许可:GPL第二版
包含在wifite包工具
wifite - 自动无线核数师
[email protected]:~# wifite -h
.;' `;,
.;' ,;' `;, `;, WiFite v2 (r85)
.;' ,;' ,;' `;, `;, `;,
:: :: : ( ) : :: :: automated wireless auditor
':. ':. ':. /_\ ,:' ,:' ,:'
':. ':. /___\ ,:' ,:' designed for Linux
':. /_____\ ,:'
/ \
COMMANDS
-check <file> check capfile <file> for handshakes.
-cracked display previously-cracked access points
GLOBAL
-all attack all targets. [off]
-i <iface> wireless interface for capturing [auto]
-mac anonymize mac address [off]
-c <channel> channel to scan for targets [auto]
-e <essid> target a specific access point by ssid (name) [ask]
-b <bssid> target a specific access point by bssid (mac) [auto]
-showb display target BSSIDs after scan [off]
-pow <db> attacks any targets with signal strenghth > db [0]
-quiet do not print list of APs during scan [off]
WPA
-wpa only target WPA networks (works with -wps -wep) [off]
-wpat <sec> time to wait for WPA attack to complete (seconds) [500]
-wpadt <sec> time to wait between sending deauth packets (sec) [10]
-strip strip handshake using tshark or pyrit [off]
-crack <dic> crack WPA handshakes using <dic> wordlist file [off]
-dict <file> specify dictionary to use when cracking WPA [phpbb.txt]
-aircrack verify handshake using aircrack [on]
-pyrit verify handshake using pyrit [off]
-tshark verify handshake using tshark [on]
-cowpatty verify handshake using cowpatty [off]
WEP
-wep only target WEP networks [off]
-pps <num> set the number of packets per second to inject [600]
-wept <sec> sec to wait for each attack, 0 implies endless [600]
-chopchop use chopchop attack [on]
-arpreplay use arpreplay attack [on]
-fragment use fragmentation attack [on]
-caffelatte use caffe-latte attack [on]
-p0841 use -p0841 attack [on]
-hirte use hirte (cfrag) attack [on]
-nofakeauth stop attack if fake authentication fails [off]
-wepca <n> start cracking when number of ivs surpass n [10000]
-wepsave save a copy of .cap files to this directory [off]
WPS
-wps only target WPS networks [off]
-wpst <sec> max wait for new retry before giving up (0: never) [660]
-wpsratio <per> min ratio of successful PIN attempts/total tries [0]
-wpsretry <num> max number of retries for same PIN before giving up [0]
EXAMPLE
./wifite.py -wps -wep -c 6 -pps 600
[+] quitting
wifite用法示例
有超过50的功率分贝(-pow 50)使用WPS攻击(-wps)攻击的接入点:
[email protected]:~# wifite -pow 50 -wps
.;' `;,
.;' ,;' `;, `;, WiFite v2 (r85)
.;' ,;' ,;' `;, `;, `;,
:: :: : ( ) : :: :: automated wireless auditor
':. ':. ':. /_\ ,:' ,:' ,:'
':. ':. /___\ ,:' ,:' designed for Linux
':. /_____\ ,:'
/ \
[+] targeting WPS-enabled networks
[+] scanning for wireless devices...
[+] enabling monitor mode on wlan0... done
[+] initializing scan (mon0), updates at 5 sec intervals, CTRL+C when ready.