A complete re-write of wifite, a Python script for auditing wireless networks.
- Lots of files instead of "one big script".
- Cleaner process management -- No longer leaves processes running in the background.
- UX: Target access points are refreshed every second instead of every 5 seconds.
- UX: Displays realtime Power level (in db) of currently-attacked target
- Backwards compatibility with the original
wifite's arguments. - Same text-based interface everyone knows and loves.
- Reaver Pixie-Dust attack (
--pixie) - Reaver WPS PIN attack (
--reaver) - WPA handshake capture (
--no-reaver) - Validates handshakes against
pyrit,tshark,cowpatty, andaircrack-ng - Various WEP attacks (replay, chopchop, fragment, etc)
- 5Ghz support for wireless cards that support 5ghz (use
-5option) - Stores cracked passwords and handshakes to the current directory, with metadata about the access point (via
--crackedcommand). - Decloaks hidden access points when channel is fixed (use
-c <channel>option) - Provides commands to crack captured WPA handshakes (via
--crackcommand)
Wifite2 is designed entirely for the latest version of Kali Rolling release (tested on Kali 2016.2, updated May 2017).
This means only the latest versions of these programs are supported: Aircrack-ng suite, wash, reaver, tshark, cowpatty.
Other pen-testing distributions (such as BackBox) have outdated versions of these suites; these distributions are not supported.
git clone https://github.com/derv82/wifite2.git
cd wifite2
./Wifite.py
Decloaking & cracking a hidden access point (via the WPA Handshake attack):
Cracking a weak WEP password (using the WEP Replay attack):


