fbpx

wifite Automated Wireless Auditor

P { margin-bottom: 0.08in; }TT.cjk { font-family: “Droid Sans”,monospace; }TT.ctl { font-family: “FreeSans”,monospace; }A:link { }

http://www.ehacking.net/2014/02/wifite-automated-wireless-auditor.html

Wireless networking has proved its
advantages over wired network, however wireless do have some
drawbacks but the advantages can easily be overcome these drawbacks.
Since WiFI is very common now a days, the user-base is very large;
home user as well as large corporations are using WiFI as their
networking mode. The security concerns have already been raised and
proved that WiFi is subject to hacking attacks; due to the security
concerns the penetration testing and auditing is viable for wifi
based networking. There are so many tools are available on Kali Linux
and other Linux distribution (if you are not using Linux then don’t
worry these tools can be installed on Windows and MAC computers) for
WiFi vulnerability scanning.


Besides from the Reaver-wps and FernWifi cracker, we have wifite. The purpose of this tool is to attack
multiple WEP, WPA, and WPS encrypted networks in a row. This tool is
customizable to be automated with only a few arguments. Wifite aims
to be the “set it and forget it” wireless auditing tool. It
has been designed and tested on Linux, backtrack, blackbuntu and
backbox, however you can test it on windows too.
Cracking WEP in 90s

Table of Contents

 

 

Features

  • sorts targets by signal strength
    (in dB); cracks closest access points first
  • automatically de-authenticates
    clients of hidden networks to reveal SSIDs
  • numerous filters to specify
    exactly what to attack (wep/wpa/both, above certain signal
    strengths, channels, etc)
  • customizable settings (timeouts,
    packets/sec, etc)
  • “anonymous” feature;
    changes MAC to a random address before attacking, then changes back
    when attacks are complete
  • all captured WPA handshakes are
    backed up to wifite.py’s current directory
  • smart WPA de-authentication;
    cycles between all clients and broadcast deauths
  • stop any attack with Ctrl+C, with
    options to continue, move onto next target, skip to cracking, or
    exit
  • displays session summary at exit;
    shows any cracked keys
  • all passwords saved to cracked.txt
  • built-in updater: ./wifite.py
    -upgrade
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...