Wifite

Disclaimer: What you do with this information is up to you. You are fully responsible for what you do with this info, and how you use it. HackMethod is not responsible for your actions. Please do not hack Wifi points that you are not allowed to.

  1. Wifiteste
  2. 25 Ways To Become The Ultimate Script Kiddie - Infosec ...
  3. Wifi Tester
  4. Wifite Walkthrough Part 1 - Infosec Resources
  5. Wifite Android

On top of that wifite still depends on what dictionaries you have. If the password is not one in those 4800 passwords included in the repository you would need another dictionary and/or hashcat/john rules. Your issue would be a bit more easy (and legal) to solve by talking to the owner. Relevant xkcd attached 2. Apr 23, 2019 WiFite2 is a complete rewrite of Wifite – a Python script for auditing wireless networks. It runs existing wireless-auditing tools for you, so you won’t need to remember command arguments and switches anymore. WiFite2: An Automated Wireless Attack tool WiFite2 is using all well-known methods for cracking/retrieving wireless (WPS/WPA/WEP) passwords: WPS: Offline Pixie-Dust attack WPS.

NOTE: I do advise having a USB WiFi adapter, and an extra point would be to get a great one like the ALFA AWUS036NHR or AWUS051NH. Although any card would do as long as it supports monitor mode and packet injection.

Wifiteste

Introduction

Wifite is an extremely useful tool for cracking wireless networks. As i mentioned previously, you need to have all the tools like airmon-ng, aireplay-ng, airodump-ng. Wifite -wpa After enabling monitor mode by typing 2 then we will select the targeted network and capture handshake hash and attack with a good wordlist After getting the handshake hash, now its time to crack the hash using a good wordlist like rock you, darkc0de or you can create your own wordlist.

When it comes to the world of WiFi hacking, the possibilities are only limited by your imagination. Skilled hackers can combine attacks together for increased efficiency, and can also judge on which attack is best to use given a particular situation. By the end of this guide you should have an overall idea on the types of attacks that you can use against any WiFi-enabled AP or router.

Getting Started

The tool that this guide will be using is Wifite.

Now I wont be including how to do it using any other tools, because this should work just fine. I’ll leave the exploration up to you.

To get started, install Wifite on your machine by following the installation instructions that are stated here.

Scanning for Wifi points

Simply run wifite.py -i <wlan interface here *NOT IN MONITOR MODE*> or if you didnt understand the previous command simply use wifite.py and it will begin scanning for nearby access points and their features (Encryption method and if WPS is enabled or not).

NOTE: I always recommend to spoof your mac address using the --mac flag to the program or macchanger. Its for your safety.

Here are the 3 types of targets you can find:

  • WEP protected routers
  • WPA/WPA2 protected routers
  • Open routers

Now within those categories, you can find a feature called WPS (Wi-Fi Protected Setup) enabled, which uses an 8 digit PIN to add devices to a WiFi network without having to input long passwords.

Attacking WEP protected WiFi points

WEP is an old and depreceated way of protecting WiFi passwords, so if you find one, you are in luck. WEP takes substantially less time. This is easily automated in Wifite, and it even uses multiple attacks against routers to get the password. You only need around ~10 to 120 minutes to crack WEP, maybe longer. I cant say much because I have never seen any WEP protected routers were I live and never had the time to set one up and try myself.

Wifite

Here is how the attack should look (picture taken from Wifite Github wiki):

25 Ways To Become The Ultimate Script Kiddie - Infosec ...

Attacking WPA/WPA2 protected WiFi points

When it comes to WPA, we need to grab the handshake by deauthing clients who are connected to the router and sniffing the handshake as it goes. This is automated in Wifite, and it handles everything. Note: You may grab the handshake in a small amount of time, but cracking the hash itself will take a pure brute-force attack or a wordlist, which takes alot of time. Only use this method if you have a really powerful GPU/CPU or if all other options have failed.

Attacking WPS enabled WiFi points

Now comes the fun part, WPS cracking. There are 2 attacks you can do on WPS enabled routers, a WPS PIN bruteforce and a WPSPixie attack. The WPS PIN attack works online, as in all PIN guesses are actually sent to the router, while the WPSPixie attack works offline and without flooding the router with WPS PIN attempts.

Now the obvious disadvantage about the WPS PIN attack is that some routers have on-board anti-bruteforce mechanisms and will stop accepting your attempts after a few attempts. I only go this route if the WPSPixie attack fails and there is no anti-bruteforce mechanism (Wifite will tell you if detects one).

The WPSPixie attack is one of the best attacks on Wifi points I have ever seen. In most cases, you can get the WiFi password in minutes or even a few seconds. Be aware that it may take up to 30 minutes in some cases, although I have never personally seen it go beyond 10 or so minutes. NOTE: The WPSPixie attack may not work on some routers, and you will have to choose a different route. (Wifite will also notify you if the WPSPixie attack will not work.

NOTE: Sometimes you will see that Wifite gets stuck at Waiting for beacon from 'xx:xx:xx:xx'. If it gets stuck for a while at this point, press CTRL+C and move on to a different target.

Wifite hacking WPS enabled points using WPS PIN Bruteforce

Conclusion

So thats pretty much it when it comes to hacking WiFi using Wifite. There are other ways of doing this, such as using the aircrack-ng suite of tools and/or using dedicated WPS hacking tools such as reaver. Additionally, this guide is only but a small slice of the world of wireless hacking, so be sure to stay tuned for more wireless hacking tutorials soon!

How to Crack WiFi WPA/WPA2 using WiFite and Aircrack ...

Wifi Tester

Troubleshooting and fixing issues with Wifi (specifically Wifite) on Kali Linux.
Need help? Join my Discord: https://discord.com/invite/usKSyzb​
Commands:
hcxdumptool:
sudo apt install hcxdumptool

hcxpcaptool:
apt install hcxtools

pyrit:
sudo apt-get install libpcap-dev
sudo apt-get install python2.7-dev libssl-dev zlib1g-dev libpcap-dev
git clone https://github.com/JPaulMora/Pyrit.git​
cd Pyrit
sudo python setup.py clean
sudo python setup.py build
sudo python setup.py install


Menu:
Overview: 0:00​
Exception: airmon-ng did not find wifi interfaces: 0:25
​Need to use sudo: 1:17​
Missing software: 1:40​
Verify Interent connectivity: 2:09
​Update references: 2:17​
Virtual Machine settings: 2:25
​hcxdumptool: 3:07​
hcxtools: 3:35​
pyrit: 3:48​
Test wifite: 6:08​
wifite wpa kill: 6:29​
Bypass wifite attacks: 8:10​
Password: 9:30​


Links:
Wifite: https://github.com/derv82/wifite2
​Alfa AWUS036NHA: https://amzn.to/3qbQGKN​
Alfa AWUSO36NH: https://amzn.to/3moeQiI​


Connect with me:
Discord: http://discord.davidbombal.com
​Twitter: https://www.twitter.com/davidbombal​
Instagram: https://www.instagram.com/davidbombal​
LinkedIn: https://www.linkedin.com/in/davidbombal​
Facebook: https://www.facebook.com/davidbombal.co​
TikTok: http://tiktok.com/@davidbombal​
YouTube: https://www.youtube.com/davidbombal​


Support me:
Join thisisIT: https://bit.ly/thisisitccna
​Or, buy my CCNA course and support me:
DavidBombal.com: CCNA ($10): http://bit.ly/yt999ccna
​Udemy CCNA Course: https://bit.ly/ccnafor10dollars​
GNS3 CCNA Course: CCNA ($10): https://bit.ly/gns3ccna10​

Wifite Walkthrough Part 1 - Infosec Resources


Special Offers:
Cisco Press: Up to 50% discount
Save every day on Cisco Press learning products! Use discount code BOMBAL during checkout to save 35% on print books (plus free shipping in the U.S.), 45% on eBooks, and 50% on video courses and simulator software. Offer expires December 31, 2020. Shop now.
Link: bit.ly/ciscopress50

ITPro.TV:
https://itpro.tv/davidbombal​
30% discount off all plans Code: DAVIDBOMBAL

Boson software: 15% discount
Link: bit.ly/boson15
Code: DBAF15P

wifi
kali
wifi
kali linux 2020
kali linux 2020.4
wifite
wifite2
wifite2 kali linux
wpa
wep
wps
alfa
comptia
cech
oscp

Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!

Wifite Android

#kalilinux​ #wifi​ #wifite