githubEdit

Wifite

TIP: Always run with sudo

Usage:

1) Help page

wifite -h 

2) Check in which wireless network we are currently connected

wifite -i wlan0 

3) Check for other access points operating on the same specified channel

wifite -c CHANNEL_NUM, CHANNEL_NUM2 

4) Filter out only the access points with clients connected

wifite --clients-only 

5) Changes interface from monitor mode to managed (default) mode

wifite --daemon 

6) (Find all networks around us that are running on WEP protocol) Press CTRL+C to stop scanning then choose a target.

wifite --wep 

TIP: On step 6, you can conduct a replay attack on the WEP protocol. Does not work on WPA since WPA implements a sequence counter to protect replay attacks.

7) Skip crack option will tell wifite to stop the tool from cracking any handshake it captures. Running wifite without arguments is the default function to scan networks.

8) Filter out a specific attack (PMKID in this case

9) Scan delay before attacking targets to avoid triggering security mechanisms

10) Set a timeout delay

11) No deauth attack on the target

12) Target WPA networks only

13) Ignore existing handshakes and capture new ones

14) Use a custom wordlist

15) Display already cracked targets

16) Validate handshakes

17) Crack handshake file

18) Kill conflicting processes that may interfere with the tool

19) MAC Spoofing. Don't forget to check your real MAC with ip a or ifconfig

20) Set a decibel frequency threshold

Last updated