wifite

WIFITE(1)                    General Commands Manual                   WIFITE(1)



NAME
       wifite - Python script to automate wireless auditing using aircrack-ng
       tools

SYNOPSIS
       wifite [SETTINGS] [FILTERS]

DESCRIPTION
       Wifite is a tool to audit WEP or WPA encrypted wireless networks.  It
       uses aircrack-ng, pyrit, reaver, tshark tools to perform the audit.

       This tool is customizable to be automated with only a few arguments and
       can be trusted to run without supervision.

COMMANDS
         -check <file>     check capfile <file> for handshakes.
         -cracked          display previously-cracked access points

GLOBAL
         -all         attack all targets.              [off]
         -i <iface>   wireless interface for capturing [auto]
         -mac         Changes MAC address of 'iface' to a random MAC. [off]
         -c <channel> channel to scan for targets      [auto]
         -e <essid>   target a specific access point by ssid (name)  [ask]
         -b <bssid>   target a specific access point by bssid (mac)  [auto]
         -showb  display target BSSIDs after scan               [off]
         -pow <db>    attacks any targets with signal strenghth > db [0]
         -q -quiet    do not print list of APs during scan           [off]

WPA
         -wpa         only target WPA networks (works with -wps -wep)   [off]
         -wpat <sec>  time to wait for WPA attack to complete (seconds) [500]
         -wpadt <sec> time to wait between sending deauth packets (sec) [10]
         -strip  strip handshake using tshark or pyrit             [off]
         -crack <dic> crack WPA handshakes using <dic> wordlist file    [off]
         -dict <file> specify dictionary to use when cracking WPA [phpbb.txt]
         -aircrack    verify handshake using aircrack [on]
         -pyrit  verify handshake using pyrit    [off]
         -tshark verify handshake using tshark   [on]

WEP
         -wep         only target WEP networks [off]
         -pps <num>   set the number of packets per second to inject [600]
         -wept <sec>  sec to wait for each attack, 0 implies endless [600]
         -chopchop    use chopchop attack      [on]
         -arpreplay   use arpreplay attack     [on]
         -fragment    use fragmentation attack [on]
         -caffelatte  use caffe-latte attack   [on]
         -p0841  use -p0841 attack        [on]
         -hirte  use hirte (cfrag) attack [on]
         -nofakeauth  stop attack if fake authentication fails    [off]
         -wepca <n>   start cracking when number of ivs surpass n [10000]
         -wepsave     save a copy of .cap files to this directory [off]

WPS
         -wps                   only target WPS networks         [off]
         -wpst -wpstime <sec>   max wait for new retry before giving up (0:
       never)  [660]
         -wpsratio -wpsr <per>  min ratio of successful PIN attempts/total tries
       [0]
         -wpsretry -wpsmaxr <num>    max number of retries for same PIN before
       giving up [0]

OTHERS COMMANDS
         -upgrade     Checks for new version
         -update Checks for new version

EXAMPLES
         ./wifite.py -wps -wep -c 6 -pps 600

AUTHOR
       Dave M (derv82@gmail.com)

       This manual page was written by Daniel Echeverry <epsilon77@gmail.com>,
       for the Debian project (and may be used by others).



                                   30/07/2012                          WIFITE(1)