Wifite包装说明

要攻击多个WEP,WPA和WPS加密网络在一排。这个工具是可定制的,以与仅几个参数是自动的。 Wifite的目标是成为“设置它和忘记它”无线审计工具。 产品特点:

  • 通过排序的信号强度(单位为dB)的目标;裂缝最近的接入点第一
  • 自动去验证隐秘的网络来显示的SSID的客户
  • 众多的过滤器来精确指定攻击​​是什么(WEP / WPA /两个,超过一定的信号强度,频道等)
  • 自定义设置(超时,数据包/秒,等等)
  • “匿名”功能;修改MAC以攻击前的随机地址,然后更改回来的时候攻击是完整的
  • 所有捕获的WPA握手都备份到wifite.py当前目录
  • 智能WPA解除认证;所有客户端和广播deauths之间的周期
  • 停止使用Ctrl + C的任何攻击,以选择继续,移动到下一个目标,跳到开裂,或退出
  • 显示在退出会议纪要;显示有任何破解密钥
  • 所有密码保存到cracked.txt 资料来源:https://code.google.com/p/wifite/

Wifite首页 | 卡利Wifite回购

  • 作者:柴油merkler
  • 许可:GPL第二版

    0x01 包含在wifite包工具

    wifite - 自动无线核数师
    :~# wifite -h
    .;'                     `;,
    .;'  ,;'             `;,  `;,   WiFite v2 (r85)
    .;'  ,;'  ,;'     `;,  `;,  `;,
    ::   ::   :   ( )   :   ::   ::  automated wireless auditor
    ':.  ':.  ':. /_\ ,:'  ,:'  ,:'
    ':.  ':.    /___\    ,:'  ,:'   designed for Linux
    ':.       /_____\      ,:'
             /       \
     COMMANDS
      -check <file>   check capfile <file> for handshakes.
      -cracked        display previously-cracked access points
     GLOBAL
      -all            attack all targets.              [off]
      -i <iface>      wireless interface for capturing [auto]
      -mac            anonymize mac address            [off]
      -c <channel>    channel to scan for targets      [auto]
      -e <essid>      target a specific access point by ssid (name)  [ask]
      -b <bssid>      target a specific access point by bssid (mac)  [auto]
      -showb          display target BSSIDs after scan               [off]
      -pow <db>       attacks any targets with signal strenghth > db [0]
      -quiet          do not print list of APs during scan           [off]
     WPA
      -wpa            only target WPA networks (works with -wps -wep)   [off]
      -wpat <sec>     time to wait for WPA attack to complete (seconds) [500]
      -wpadt <sec>    time to wait between sending deauth packets (sec) [10]
      -strip          strip handshake using tshark or pyrit             [off]
      -crack <dic>    crack WPA handshakes using <dic> wordlist file    [off]
      -dict <file>    specify dictionary to use when cracking WPA [phpbb.txt]
      -aircrack       verify handshake using aircrack [on]
      -pyrit          verify handshake using pyrit    [off]
      -tshark         verify handshake using tshark   [on]
      -cowpatty       verify handshake using cowpatty [off]
     WEP
      -wep            only target WEP networks [off]
      -pps <num>      set the number of packets per second to inject [600]
      -wept <sec>     sec to wait for each attack, 0 implies endless [600]
      -chopchop       use chopchop attack      [on]
      -arpreplay      use arpreplay attack     [on]
      -fragment       use fragmentation attack [on]
      -caffelatte     use caffe-latte attack   [on]
      -p0841          use -p0841 attack        [on]
      -hirte          use hirte (cfrag) attack [on]
      -nofakeauth     stop attack if fake authentication fails    [off]
      -wepca <n>      start cracking when number of ivs surpass n [10000]
      -wepsave        save a copy of .cap files to this directory [off]
     WPS
      -wps        only target WPS networks         [off]
      -wpst <sec>     max wait for new retry before giving up (0: never)  [660]
      -wpsratio <per> min ratio of successful PIN attempts/total tries    [0]
      -wpsretry <num> max number of retries for same PIN before giving up [0]
     EXAMPLE
      ./wifite.py -wps -wep -c 6 -pps 600
    [+] quitting
    

    0x02 wifite用法示例

    有超过50的功率分贝 (-pow 50) 使用WPS攻击 (-wps) 攻击的接入点:
    :~# wifite -pow 50 -wps
    .;'                     `;,    
    .;'  ,;'             `;,  `;,   WiFite v2 (r85)
    .;'  ,;'  ,;'     `;,  `;,  `;,  
    ::   ::   :   ( )   :   ::   ::  automated wireless auditor
    ':.  ':.  ':. /_\ ,:'  ,:'  ,:'  
    ':.  ':.    /___\    ,:'  ,:'   designed for Linux
    ':.       /_____\      ,:'     
             /       \             
    [+] targeting WPS-enabled networks
    [+] scanning for wireless devices...
    [+] enabling monitor mode on wlan0... done
    [+] initializing scan (mon0), updates at 5 sec intervals, CTRL+C when ready.
    

    原文来自https://www.hackfun.org/kali-tools/wifite_zh.html。转载请注明原出处,商用请联系原作者授权。

results matching ""

    No results matching ""