To attack multiple WEP, WPA, and WPS encrypted networks in a row. This tool is customizable to be automated with only a few arguments. Wifite aims to be the “set it and forget it” wireless auditing tool.
Sort targets by signal strength (in dB); cracks closest access points first.
Automatically de-authenticates clients of hidden networks to reveal SSIDs.
Numerous filters to specify exactly what to attack (wep/wpa/both, above certain signal strengths, channels, etc).
Customizable settings (timeouts, packets/sec, etc).
Anonymous feature; changes MAC to a random address before attacking, then changes back when attacks are complete.
All captured WPA handshakes are backed up to wifite.py’s current directory.
Smart WPA de-authentication; cycles between all clients and broadcast deauths.
Stop any attack with Ctrl+C, with options to continue, move onto next target, skip to cracking, or exit.
Displays session summary at exit; shows any cracked keys.
All passwords saved to cracked.txt.
The tool comes pre-installed on Kali Linux, you need a WIFI card that support monitor mode and injection mode, first let’s list our WIFI card and make sure it’s running:
The wlan0 is our WIFI but it’s running in managed mode which is the normal mode, to put it into monitor mode type “airmon-ng start wlan0”:
Now it’s ready to work, now we need to start “wifite” with a simple command which will allow us to scan for networks, then after that we’re going to select a target and it will capture the WPA Handshake and finally will start a dictionary attack against the target WPA Handshake cracking the password.
wifite –wpa –dict /root/pass/rockyou.txt
It started scanning for WIFIs around you, and when you ready to stop scanning just use CTRL+C to go to the next step:
It found 25 targets, and now if you targeting a specific WIFI enter its number, and if more than one target enters the number followed by – between the targets:
Now what i did is I entered number 2 corresponding with the target WIFI, and then CTRL+C to stop the “Pixie-Dust” attack, and then “C” to continue for the next type of attack:
Also, in here skipped this attack “Null PIN”:
Same goes to “PIN Attack:
And this is the last one to skip, as the next attack is the “Handshake Attack” which is what we looking for:
It will go for a while depending on the strength of the WIFI password, but when finally finds it will be something like this:
The password is found and stored in a file “cracked.json”.