Wifite包装说明
要攻击多个WEP,WPA和WPS加密网络在一排。这个工具是可定制的,以与仅几个参数是自动的。 Wifite的目标是成为“设置它和忘记它”无线审计工具。 产品特点:
- 通过排序的信号强度(单位为dB)的目标;裂缝最近的接入点第一
- 自动去验证隐秘的网络来显示的SSID的客户
- 众多的过滤器来精确指定攻击是什么(WEP / WPA /两个,超过一定的信号强度,频道等)
- 自定义设置(超时,数据包/秒,等等)
- “匿名”功能;修改MAC以攻击前的随机地址,然后更改回来的时候攻击是完整的
- 所有捕获的WPA握手都备份到wifite.py当前目录
- 智能WPA解除认证;所有客户端和广播deauths之间的周期
- 停止使用Ctrl + C的任何攻击,以选择继续,移动到下一个目标,跳到开裂,或退出
- 显示在退出会议纪要;显示有任何破解密钥
- 所有密码保存到cracked.txt 资料来源:https://code.google.com/p/wifite/
- 作者:柴油merkler
- 许可:GPL第二版
0x01 包含在wifite包工具
wifite - 自动无线核数师:~# wifite -h .;' `;, .;' ,;' `;, `;, WiFite v2 (r85) .;' ,;' ,;' `;, `;, `;, :: :: : ( ) : :: :: automated wireless auditor ':. ':. ':. /_\ ,:' ,:' ,:' ':. ':. /___\ ,:' ,:' designed for Linux ':. /_____\ ,:' / \ COMMANDS -check <file> check capfile <file> for handshakes. -cracked display previously-cracked access points GLOBAL -all attack all targets. [off] -i <iface> wireless interface for capturing [auto] -mac anonymize mac address [off] -c <channel> channel to scan for targets [auto] -e <essid> target a specific access point by ssid (name) [ask] -b <bssid> target a specific access point by bssid (mac) [auto] -showb display target BSSIDs after scan [off] -pow <db> attacks any targets with signal strenghth > db [0] -quiet do not print list of APs during scan [off] WPA -wpa only target WPA networks (works with -wps -wep) [off] -wpat <sec> time to wait for WPA attack to complete (seconds) [500] -wpadt <sec> time to wait between sending deauth packets (sec) [10] -strip strip handshake using tshark or pyrit [off] -crack <dic> crack WPA handshakes using <dic> wordlist file [off] -dict <file> specify dictionary to use when cracking WPA [phpbb.txt] -aircrack verify handshake using aircrack [on] -pyrit verify handshake using pyrit [off] -tshark verify handshake using tshark [on] -cowpatty verify handshake using cowpatty [off] WEP -wep only target WEP networks [off] -pps <num> set the number of packets per second to inject [600] -wept <sec> sec to wait for each attack, 0 implies endless [600] -chopchop use chopchop attack [on] -arpreplay use arpreplay attack [on] -fragment use fragmentation attack [on] -caffelatte use caffe-latte attack [on] -p0841 use -p0841 attack [on] -hirte use hirte (cfrag) attack [on] -nofakeauth stop attack if fake authentication fails [off] -wepca <n> start cracking when number of ivs surpass n [10000] -wepsave save a copy of .cap files to this directory [off] WPS -wps only target WPS networks [off] -wpst <sec> max wait for new retry before giving up (0: never) [660] -wpsratio <per> min ratio of successful PIN attempts/total tries [0] -wpsretry <num> max number of retries for same PIN before giving up [0] EXAMPLE ./wifite.py -wps -wep -c 6 -pps 600 [+] quitting
0x02 wifite用法示例
有超过50的功率分贝 (-pow 50) 使用WPS攻击 (-wps) 攻击的接入点::~# wifite -pow 50 -wps .;' `;, .;' ,;' `;, `;, WiFite v2 (r85) .;' ,;' ,;' `;, `;, `;, :: :: : ( ) : :: :: automated wireless auditor ':. ':. ':. /_\ ,:' ,:' ,:' ':. ':. /___\ ,:' ,:' designed for Linux ':. /_____\ ,:' / \ [+] targeting WPS-enabled networks [+] scanning for wireless devices... [+] enabling monitor mode on wlan0... done [+] initializing scan (mon0), updates at 5 sec intervals, CTRL+C when ready.
原文来自https://www.hackfun.org/kali-tools/wifite_zh.html。转载请注明原出处,商用请联系原作者授权。