wifite Automated Wireless Auditor

P { margin-bottom: 0.08in; }TT.cjk { font-family: “Droid Sans”,monospace; }TT.ctl { font-family: “FreeSans”,monospace; }A:link { }

http://www.ehacking.net/2014/02/wifite-automated-wireless-auditor.html

Wireless networking has proved its
advantages over wired network, however wireless do have some
drawbacks but the advantages can easily be overcome these drawbacks.
Since WiFI is very common now a days, the user-base is very large;
home user as well as large corporations are using WiFI as their
networking mode. The security concerns have already been raised and
proved that WiFi is subject to hacking attacks; due to the security
concerns the penetration testing and auditing is viable for wifi
based networking. There are so many tools are available on Kali Linux
and other Linux distribution (if you are not using Linux then don’t
worry these tools can be installed on Windows and MAC computers) for
WiFi vulnerability scanning.


Besides from the Reaver-wps and FernWifi cracker, we have wifite. The purpose of this tool is to attack
multiple WEP, WPA, and WPS encrypted networks in a row. This tool is
customizable to be automated with only a few arguments. Wifite aims
to be the “set it and forget it” wireless auditing tool. It
has been designed and tested on Linux, backtrack, blackbuntu and
backbox, however you can test it on windows too.
Cracking WEP in 90s

 

 

Features

  • sorts targets by signal strength
    (in dB); cracks closest access points first
  • automatically de-authenticates
    clients of hidden networks to reveal SSIDs
  • numerous filters to specify
    exactly what to attack (wep/wpa/both, above certain signal
    strengths, channels, etc)
  • customizable settings (timeouts,
    packets/sec, etc)
  • “anonymous” feature;
    changes MAC to a random address before attacking, then changes back
    when attacks are complete
  • all captured WPA handshakes are
    backed up to wifite.py’s current directory
  • smart WPA de-authentication;
    cycles between all clients and broadcast deauths
  • stop any attack with Ctrl+C, with
    options to continue, move onto next target, skip to cracking, or
    exit
  • displays session summary at exit;
    shows any cracked keys
  • all passwords saved to cracked.txt
  • built-in updater: ./wifite.py
    -upgrade
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

Blind SQL Injection Tutorial to Hack a Website

In the previous article, we have the basics of SQL Injection; what SQLi is and what are the types of SQL injection. And, In...

What is SQL Injection? Tutorial: Type and Example

What is SQL injection, and what are the types of SQL injection? These are the common questions, and we will seek the answer to...

Are Cisco 300-410 Exam and Its Related Certification Your Pathway to Career Success? Find Out about This

Introduction Career success can mean different things to different people. For some, it could mean having a prestigious title and for others, it could be...

How to Hack Windows 10 Password Using FakeLogonScreen in Kali Linux

This article demonstrates an in-depth guide on how to hack Windows 10 Passwords using FakeLogonScreen. Hacking Windows 10 password is an exciting topic and...

LOOKING FOR HACKING RECIPES FORM THE PRO?

Then sign up for FREE to the ehacking’s exclusive group. You will get the exclusive tips/tricks, tutorials, webinars & courses that I ONLY share with my fellow on this exclusive newsletter.