How to Hack WIFI Networks with WIFITE

To attack multiple WEP, WPA, and WPS encrypted networks in a row. This tool is customizable to be automated with only a few arguments. Wifite aims to be the “set it and forget it” wireless auditing tool.


Sort targets by signal strength (in dB); cracks closest access points first.

Automatically de-authenticates clients of hidden networks to reveal SSIDs.

Numerous filters to specify exactly what to attack (wep/wpa/both, above certain signal strengths, channels, etc).

Customizable settings (timeouts, packets/sec, etc).

 Anonymous feature; changes MAC to a random address before attacking, then changes back when attacks are complete.

All captured WPA handshakes are backed up to’s current directory.

Smart WPA de-authentication; cycles between all clients and broadcast deauths.

Stop any attack with Ctrl+C, with options to continue, move onto next target, skip to cracking, or exit.

Displays session summary at exit; shows any cracked keys.

All passwords saved to cracked.txt.

The tool comes pre-installed on Kali Linux, you need a WIFI card that support monitor mode and injection mode, first let’s list our WIFI card and make sure it’s running:

The wlan0 is our WIFI but it’s running in managed mode which is the normal mode, to put it into monitor mode type “airmon-ng start wlan0”:

Now it’s ready to work, now we need to start “wifite” with a simple command which will allow us to scan for networks, then after that we’re going to select a target and it will capture the WPA Handshake and finally will start a dictionary attack against the target WPA Handshake cracking the password.

wifite –wpa –dict /root/pass/rockyou.txt

It started scanning for WIFIs around you, and when you ready to stop scanning just use CTRL+C to go to the next step:

It found 25 targets, and now if you targeting a specific WIFI enter its number, and if more than one target enters the number followed by – between the targets:

Now what i did is I entered number 2 corresponding with the target WIFI, and then CTRL+C to stop the “Pixie-Dust” attack, and then “C” to continue for the next type of attack:

Also, in here skipped this attack “Null PIN”:

Same goes to “PIN Attack:

And this is the last one to skip, as the next attack is the “Handshake Attack” which is what we looking for:

It will go for a while depending on the strength of the WIFI password, but when finally finds it will be something like this:

The password is found and stored in a file “cracked.json”.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s