CIP Cyber

wifite Automated Wireless Auditor

Table of Contents

P { margin-bottom: 0.08in; }TT.cjk { font-family: “Droid Sans”,monospace; }TT.ctl { font-family: “FreeSans”,monospace; }A:link { }

http://www.ehacking.net/2014/02/wifite-automated-wireless-auditor.html

Wireless networking has proved its
advantages over wired network, however wireless do have some
drawbacks but the advantages can easily be overcome these drawbacks.
Since WiFI is very common now a days, the user-base is very large;
home user as well as large corporations are using WiFI as their
networking mode. The security concerns have already been raised and
proved that WiFi is subject to hacking attacks; due to the security
concerns the penetration testing and auditing is viable for wifi
based networking. There are so many tools are available on Kali Linux
and other Linux distribution (if you are not using Linux then don’t
worry these tools can be installed on Windows and MAC computers) for
WiFi vulnerability scanning.


Besides from the Reaver-wps and FernWifi cracker, we have wifite. The purpose of this tool is to attack
multiple WEP, WPA, and WPS encrypted networks in a row. This tool is
customizable to be automated with only a few arguments. Wifite aims
to be the “set it and forget it” wireless auditing tool. It
has been designed and tested on Linux, backtrack, blackbuntu and
backbox, however you can test it on windows too.
Cracking WEP in 90s

 

 

Features

  • sorts targets by signal strength
    (in dB); cracks closest access points first
  • automatically de-authenticates
    clients of hidden networks to reveal SSIDs
  • numerous filters to specify
    exactly what to attack (wep/wpa/both, above certain signal
    strengths, channels, etc)
  • customizable settings (timeouts,
    packets/sec, etc)
  • “anonymous” feature;
    changes MAC to a random address before attacking, then changes back
    when attacks are complete
  • all captured WPA handshakes are
    backed up to wifite.py’s current directory
  • smart WPA de-authentication;
    cycles between all clients and broadcast deauths
  • stop any attack with Ctrl+C, with
    options to continue, move onto next target, skip to cracking, or
    exit
  • displays session summary at exit;
    shows any cracked keys
  • all passwords saved to cracked.txt
  • built-in updater: ./wifite.py
    -upgrade
CIP Cyber Staff

CIP Cyber Staff

CIP Cyber Staff comprises CIP cybersecurity experts committed to delivering comprehensive information on critical infrastructure protection. The content covers diverse topics, equipping professionals to defend organizations and communities in an ever-evolving cyber landscape.

Most popular

Industrial Cybersecurity

Want always be up to date?

Don't miss the latest news

By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.

CIP Training & Certifications

Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings

Related Articles

Want always be up to date?

Don't miss the latest news

By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.

CIP Training & Certifications

Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings