derv82/wifite2
In Summary : Reaver (or -bully ) Pixie-Dust attack (enabled by-default, force with: --wps-only ) WPA handshake capture (enabled by-defau...
https://updatesinfosec.blogspot.com/2018/06/derv82wifite2.html
In Summary :
kindly refer the following link as follow up :
https://github.com/derv82/wifite2
- Reaver (or
-bully) Pixie-Dust attack (enabled by-default, force with:--wps-only) - WPA handshake capture (enabled by-default, force with:
--no-wps) - Validates handshakes against
pyrit,tshark,cowpatty, andaircrack-ng(when available) - Various WEP attacks (replay, chopchop, fragment, hirte, p0841, caffe-latte)
- Automatically decloaks hidden access points while scanning or attacking.
- Note: Only works when channel is fixed. Use the
-c <channel>switch. - Disable this via
--no-deauthsswitch
- Note: Only works when channel is fixed. Use the
- 5Ghz support for some wireless cards (via
-5switch).- Note: Some tools don't play well on 5GHz channels (e.g.
aireplay-ng)
- Note: Some tools don't play well on 5GHz channels (e.g.
- Stores cracked passwords and handshakes to the current directory (
--cracked)- Includes metadata about the access point.
- Provides commands to crack captured WPA handshakes (
--crack)- Includes all commands needed to crack using
aircrack-ng,john,hashcat, orpyrit.
- Includes all commands needed to crack using
kindly refer the following link as follow up :
https://github.com/derv82/wifite2