diff --git a/tools/wifite.md b/tools/wifite.md new file mode 100644 index 0000000..d2b4e18 --- /dev/null +++ b/tools/wifite.md @@ -0,0 +1,83 @@ +# wifite + +Notes +------- + + + +Help Text +------- +``` + .;' `;, + .;' ,;' `;, `;, WiFite v2 (r85) +.;' ,;' ,;' `;, `;, `;, +:: :: : ( ) : :: :: automated wireless auditor +':. ':. ':. /_\ ,:' ,:' ,:' + ':. ':. /___\ ,:' ,:' designed for Linux + ':. /_____\ ,:' + / \ + + COMMANDS + -check check capfile for handshakes. + -cracked display previously-cracked access points + + GLOBAL + -all attack all targets. [off] + -i wireless interface for capturing [auto] + -mac anonymize mac address [off] + -c channel to scan for targets [auto] + -e target a specific access point by ssid (name) [ask] + -b target a specific access point by bssid (mac) [auto] + -showb display target BSSIDs after scan [off] + -pow attacks any targets with signal strenghth > db [0] + -quiet do not print list of APs during scan [off] + + + WPA + -wpa only target WPA networks (works with -wps -wep) [off] + -wpat time to wait for WPA attack to complete (seconds) [500] + -wpadt time to wait between sending deauth packets (sec) [10] + -strip strip handshake using tshark or pyrit [off] + -crack crack WPA handshakes using wordlist file [off] + -dict specify dictionary to use when cracking WPA [phpbb.txt] + -aircrack verify handshake using aircrack [on] + -pyrit verify handshake using pyrit [off] + -tshark verify handshake using tshark [on] + -cowpatty verify handshake using cowpatty [off] + + WEP + -wep only target WEP networks [off] + -pps set the number of packets per second to inject [600] + -wept sec to wait for each attack, 0 implies endless [600] + -chopchop use chopchop attack [on] + -arpreplay use arpreplay attack [on] + -fragment use fragmentation attack [on] + -caffelatte use caffe-latte attack [on] + -p0841 use -p0841 attack [on] + -hirte use hirte (cfrag) attack [on] + -nofakeauth stop attack if fake authentication fails [off] + -wepca start cracking when number of ivs surpass n [10000] + -wepsave save a copy of .cap files to this directory [off] + + WPS + -wps only target WPS networks [off] + -wpst max wait for new retry before giving up (0: never) [660] + -wpsratio min ratio of successful PIN attempts/total tries [0] + -wpsretry max number of retries for same PIN before giving up [0] + + EXAMPLE + ./wifite.py -wps -wep -c 6 -pps 600 + +``` + +Example Usage +------- + + +``` + +``` + +Links +------- +