<head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<meta charset="utf-8">
<meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1">
<title>kali工具箱</title>
<script src="./static/bootstrap.min.js"></script>
<link rel="stylesheet" href="./static/main.css">
<link rel="stylesheet" href="./static/bootstrap.min.css">
<style type="text/css" id="syntaxhighlighteranchor"></style>
</head>
<main class="main-container ng-scope" ng-view="">
<div class="main receptacle post-view ng-scope">
<article class="entry ng-scope" ng-controller="EntryCtrl" ui-lightbox="">
<section class="entry-content ng-binding" ng-bind-html="postContentTrustedHtml">
<section class="l-section"><div class="l-section-h i-cf"><h2>Wifite Package Description</h2>
<p style="text-align: justify;">To attack multiple WEP, WPA, and WPS encrypted networks in a row. This tool is customizable to be automated with only a few arguments. Wifite aims to be the “set it and forget it” wireless auditing tool. </p>
<p>Features:</p>
<ul>
<li>sorts targets by signal strength (in dB); cracks closest access points first</li>
<li>automatically de-authenticates clients of hidden networks to reveal SSIDs</li>
<li>numerous filters to specify exactly what to attack (wep/wpa/both, above certain signal strengths, channels, etc)</li>
<li>customizable settings (timeouts, packets/sec, etc)</li>
<li>“anonymous” feature; changes MAC to a random address before attacking, then changes back when attacks are complete</li>
<li>all captured WPA handshakes are backed up to wifite.py’s current directory</li>
<li>smart WPA de-authentication; cycles between all clients and broadcast deauths</li>
<li>stop any attack with Ctrl+C, with options to continue, move onto next target, skip to cracking, or exit</li>
<li>displays session summary at exit; shows any cracked keys</li>
<li>all passwords saved to cracked.txt</li>
</ul>
<p>Source: https://code.google.com/p/wifite/<br>
<a href="https://code.google.com/p/wifite/" variation="deepblue" target="blank">Wifite Homepage</a> | <a href="http://git.kali.org/gitweb/?p=packages/wifite.git;a=summary" variation="deepblue" target="blank">Kali Wifite Repo</a></p>
<ul>
<li>Author: derv merkler</li>
<li>License: GPLv2</li>
</ul>
<h3>Tools included in the wifite package</h3>
<h5>wifite – Automated wireless auditor</h5>
<code><a class="__cf_email__" href="/cdn-cgi/l/email-protection" data-cfemail="15677a7a61557e74797c">[email&#160;protected]</a><script data-cfhash='f9e31' type="text/javascript">/* <![CDATA[ */!function(t,e,r,n,c,a,p){try{t=document.currentScript||function(){for(t=document.getElementsByTagName('script'),e=t.length;e--;)if(t[e].getAttribute('data-cfhash'))return t[e]}();if(t&&(c=t.previousSibling)){p=t.parentNode;if(a=c.getAttribute('data-cfemail')){for(e='',r='0x'+a.substr(0,2)|0,n=2;a.length-n;n+=2)e+='%'+('0'+('0x'+a.substr(n,2)^r).toString(16)).slice(-2);p.replaceChild(document.createTextNode(decodeURIComponent(e)),c)}p.removeChild(t)}}catch(u){}}()/* ]]> */</script>:~# wifite -h<br>
<br>
  .;'                     `;,<br>
 .;'  ,;'             `;,  `;,   WiFite v2 (r85)<br>
.;'  ,;'  ,;'     `;,  `;,  `;,<br>
::   ::   :   ( )   :   ::   ::  automated wireless auditor<br>
':.  ':.  ':. /_\ ,:'  ,:'  ,:'<br>
 ':.  ':.    /___\    ,:'  ,:'   designed for Linux<br>
  ':.       /_____\      ,:'<br>
           /       \<br>
<br>
   COMMANDS<br>
    -check &lt;file&gt;   check capfile &lt;file&gt; for handshakes.<br>
    -cracked        display previously-cracked access points<br>
<br>
   GLOBAL<br>
    -all            attack all targets.              [off]<br>
    -i &lt;iface&gt;      wireless interface for capturing [auto]<br>
    -mac            anonymize mac address            [off]<br>
    -c &lt;channel&gt;    channel to scan for targets      [auto]<br>
    -e &lt;essid&gt;      target a specific access point by ssid (name)  [ask]<br>
    -b &lt;bssid&gt;      target a specific access point by bssid (mac)  [auto]<br>
    -showb          display target BSSIDs after scan               [off]<br>
    -pow &lt;db&gt;       attacks any targets with signal strenghth &gt; db [0]<br>
    -quiet          do not print list of APs during scan           [off]<br>
<br>
<br>
   WPA<br>
    -wpa            only target WPA networks (works with -wps -wep)   [off]<br>
    -wpat &lt;sec&gt;     time to wait for WPA attack to complete (seconds) [500]<br>
    -wpadt &lt;sec&gt;    time to wait between sending deauth packets (sec) [10]<br>
    -strip          strip handshake using tshark or pyrit             [off]<br>
    -crack &lt;dic&gt;    crack WPA handshakes using &lt;dic&gt; wordlist file    [off]<br>
    -dict &lt;file&gt;    specify dictionary to use when cracking WPA [phpbb.txt]<br>
    -aircrack       verify handshake using aircrack [on]<br>
    -pyrit          verify handshake using pyrit    [off]<br>
    -tshark         verify handshake using tshark   [on]<br>
    -cowpatty       verify handshake using cowpatty [off]<br>
<br>
   WEP<br>
    -wep            only target WEP networks [off]<br>
    -pps &lt;num&gt;      set the number of packets per second to inject [600]<br>
    -wept &lt;sec&gt;     sec to wait for each attack, 0 implies endless [600]<br>
    -chopchop       use chopchop attack      [on]<br>
    -arpreplay      use arpreplay attack     [on]<br>
    -fragment       use fragmentation attack [on]<br>
    -caffelatte     use caffe-latte attack   [on]<br>
    -p0841          use -p0841 attack        [on]<br>
    -hirte          use hirte (cfrag) attack [on]<br>
    -nofakeauth     stop attack if fake authentication fails    [off]<br>
    -wepca &lt;n&gt;      start cracking when number of ivs surpass n [10000]<br>
    -wepsave        save a copy of .cap files to this directory [off]<br>
<br>
   WPS<br>
    -wps        only target WPS networks         [off]<br>
    -wpst &lt;sec&gt;     max wait for new retry before giving up (0: never)  [660]<br>
    -wpsratio &lt;per&gt; min ratio of successful PIN attempts/total tries    [0]<br>
    -wpsretry &lt;num&gt; max number of retries for same PIN before giving up [0]<br>
<br>
   EXAMPLE<br>
    ./wifite.py -wps -wep -c 6 -pps 600<br>
<br>
 [+] quitting</code>
<h3>wifite Usage Example</h3>
<p>Attack access points with over 50 dB of power <b><i>(-pow 50)</i></b> using the WPS attack <b><i>(-wps)</i></b>:</p>
<code><a class="__cf_email__" href="/cdn-cgi/l/email-protection" data-cfemail="f4869b9b80b49f95989d">[email&#160;protected]</a><script data-cfhash='f9e31' type="text/javascript">/* <![CDATA[ */!function(t,e,r,n,c,a,p){try{t=document.currentScript||function(){for(t=document.getElementsByTagName('script'),e=t.length;e--;)if(t[e].getAttribute('data-cfhash'))return t[e]}();if(t&&(c=t.previousSibling)){p=t.parentNode;if(a=c.getAttribute('data-cfemail')){for(e='',r='0x'+a.substr(0,2)|0,n=2;a.length-n;n+=2)e+='%'+('0'+('0x'+a.substr(n,2)^r).toString(16)).slice(-2);p.replaceChild(document.createTextNode(decodeURIComponent(e)),c)}p.removeChild(t)}}catch(u){}}()/* ]]> */</script>:~# wifite -pow 50 -wps<br>
<br>
  .;'                     `;,    <br>
 .;'  ,;'             `;,  `;,   WiFite v2 (r85)<br>
.;'  ,;'  ,;'     `;,  `;,  `;,  <br>
::   ::   :   ( )   :   ::   ::  automated wireless auditor<br>
':.  ':.  ':. /_\ ,:'  ,:'  ,:'  <br>
 ':.  ':.    /___\    ,:'  ,:'   designed for Linux<br>
  ':.       /_____\      ,:'     <br>
           /       \             <br>
<br>
 [+] targeting WPS-enabled networks<br>
<br>
 [+] scanning for wireless devices...<br>
 [+] enabling monitor mode on wlan0... done<br>
 [+] initializing scan (mon0), updates at 5 sec intervals, CTRL+C when ready.</code>
</div></section><div style="display:none">
<script src="//s11.cnzz.com/z_stat.php?id=1260038378&web_id=1260038378" language="JavaScript"></script>
</div>
</main></body></html>
