wifite Automated Wireless Auditor

P { margin-bottom: 0.08in; }TT.cjk { font-family: “Droid Sans”,monospace; }TT.ctl { font-family: “FreeSans”,monospace; }A:link { }


Wireless networking has proved its
advantages over wired network, however wireless do have some
drawbacks but the advantages can easily be overcome these drawbacks.
Since WiFI is very common now a days, the user-base is very large;
home user as well as large corporations are using WiFI as their
networking mode. The security concerns have already been raised and
proved that WiFi is subject to hacking attacks; due to the security
concerns the penetration testing and auditing is viable for wifi
based networking. There are so many tools are available on Kali Linux
and other Linux distribution (if you are not using Linux then don’t
worry these tools can be installed on Windows and MAC computers) for
WiFi vulnerability scanning.

Besides from the Reaver-wps and FernWifi cracker, we have wifite. The purpose of this tool is to attack
multiple WEP, WPA, and WPS encrypted networks in a row. This tool is
customizable to be automated with only a few arguments. Wifite aims
to be the “set it and forget it” wireless auditing tool. It
has been designed and tested on Linux, backtrack, blackbuntu and
backbox, however you can test it on windows too.
Cracking WEP in 90s




  • sorts targets by signal strength
    (in dB); cracks closest access points first
  • automatically de-authenticates
    clients of hidden networks to reveal SSIDs
  • numerous filters to specify
    exactly what to attack (wep/wpa/both, above certain signal
    strengths, channels, etc)
  • customizable settings (timeouts,
    packets/sec, etc)
  • “anonymous” feature;
    changes MAC to a random address before attacking, then changes back
    when attacks are complete
  • all captured WPA handshakes are
    backed up to wifite.py’s current directory
  • smart WPA de-authentication;
    cycles between all clients and broadcast deauths
  • stop any attack with Ctrl+C, with
    options to continue, move onto next target, skip to cracking, or
  • displays session summary at exit;
    shows any cracked keys
  • all passwords saved to cracked.txt
  • built-in updater: ./wifite.py
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

How to Become an Expert in Ethical Hacking

This article is mainly addressing the audience who wants to pursue their career in Cybersecurity as a professional that provides ethical hacking services, whether...

5 Cybersecurity Tips to Keep in Mind When Working From Home

  Due to the ongoing global health crisis, more and more people are being forced to work from their homes. In fact, Forbes estimates that about...

The Complete OSINT Tutorial to Find Personal Information About Anyone

This article mainly focuses on how to discover a person's digital footprint and gather personal data by using open-source intelligence (OSINT). So, in its...

How to find the password of hacked email addresses using OSINT

Open-source intelligence or OSINT is a potent technique, and it can give a lot of valuable information, if implemented correctly with the right strategy...