derv82/wifite2
In Summary : Reaver (or -bully ) Pixie-Dust attack (enabled by-default, force with: --wps-only ) WPA handshake capture (enabled by-defau...
https://updatesinfosec.blogspot.com/2018/06/derv82wifite2.html
In Summary :
kindly refer the following link as follow up :
https://github.com/derv82/wifite2
- Reaver (or
-bully
) Pixie-Dust attack (enabled by-default, force with:--wps-only
) - WPA handshake capture (enabled by-default, force with:
--no-wps
) - Validates handshakes against
pyrit
,tshark
,cowpatty
, andaircrack-ng
(when available) - Various WEP attacks (replay, chopchop, fragment, hirte, p0841, caffe-latte)
- Automatically decloaks hidden access points while scanning or attacking.
- Note: Only works when channel is fixed. Use the
-c <channel>
switch. - Disable this via
--no-deauths
switch
- Note: Only works when channel is fixed. Use the
- 5Ghz support for some wireless cards (via
-5
switch).- Note: Some tools don't play well on 5GHz channels (e.g.
aireplay-ng
)
- Note: Some tools don't play well on 5GHz channels (e.g.
- Stores cracked passwords and handshakes to the current directory (
--cracked
)- Includes metadata about the access point.
- Provides commands to crack captured WPA handshakes (
--crack
)- Includes all commands needed to crack using
aircrack-ng
,john
,hashcat
, orpyrit
.
- Includes all commands needed to crack using
kindly refer the following link as follow up :
https://github.com/derv82/wifite2