Wifite
TIP: Always run with sudo
Usage:
1) Help page
wifite -h 2) Check in which wireless network we are currently connected
wifite -i wlan0 3) Check for other access points operating on the same specified channel
wifite -c CHANNEL_NUM, CHANNEL_NUM2 4) Filter out only the access points with clients connected
wifite --clients-only 5) Changes interface from monitor mode to managed (default) mode
wifite --daemon 6) (Find all networks around us that are running on WEP protocol) Press CTRL+C to stop scanning then choose a target.
wifite --wep TIP: On step 6, you can conduct a replay attack on the WEP protocol. Does not work on WPA since WPA implements a sequence counter to protect replay attacks.
7) Skip crack option will tell wifite to stop the tool from cracking any handshake it captures. Running wifite without arguments is the default function to scan networks.
8) Filter out a specific attack (PMKID in this case
9) Scan delay before attacking targets to avoid triggering security mechanisms
10) Set a timeout delay
11) No deauth attack on the target
12) Target WPA networks only
13) Ignore existing handshakes and capture new ones
14) Use a custom wordlist
15) Display already cracked targets
16) Validate handshakes
17) Crack handshake file
18) Kill conflicting processes that may interfere with the tool
19) MAC Spoofing. Don't forget to check your real MAC with ip a or ifconfig
20) Set a decibel frequency threshold
Last updated