WiFite2 Automated WiFi Hacking Tool - Mode Lecture
WiFite2 Automated WiFi Hacking Tool - Mode Lecture
wi te2
There are many ways to attack a WiFi network. The type of encryption,
default settings of the manufacturer, and the number of connected
clients can determine how easy it will attack the target and which
method of hacking will work best. Wi te2 is a powerful tool that
automates WiFi hacking, allowing you to select targets within your
adapter’s coverage area, and then selects the best hacking strategy
for each network.
As a rule, programs are sharpened to perform one speci c function:
customer deauthentication
handshake
brute force
brute force WPS
etc., there are a lot of separate stages, methods.
Features:
sorts targets by signal (in dB); hacking the closest access points
rst
automatically deauthenticates hidden network clients to reveal
their SSID
a set of lters to accurately indicate what to attack (wep / wpa /
both, above a certain signal strength, channels, etc.)
exible settings (timeouts, packets per second, other)
“anonymity” functions: changing the MAC to a random address
before an attack, then a reverse change when the attack is
completed
all captured WPA handshakes are copied to the current wi te.py
directory
WPA smart deauthentication; cycles between deauthenticating all
clients and broadcast
stop any hacking with Ctrl + C with options to continue, go to the
next target, skip hacking or exit
display of general information on the session upon exit; show all
cracked keys
all passwords are saved in cracked.txt
Wi te or Wi te2?
Wi te is not a new tool. It was one of the rst WiFi hacking tools we
met. Along with Besside-ng, automated scripts for hacking WiFi
allowed even the script kiddie to get good results, despite the fact
that they did not understand how these scripts work. Compared to
Besside-ng, the original Wi te thoroughly used all the tools available
to it to attack the network, but at the same time it was very slow.
The updated WiFite2 works much faster due to the reduction of time
for the attacks themselves and the use of more advanced tactics than
in the previous version. Because of this, Wi te2 is a more serious and
powerful tool for hacking WiFi than the original Wi te.
First of all, Wi te2 scans all channels in search of all networks in the
coverage area. Then it ranks the found networks by signal level, since
the fact of nding a network does not guarantee a reliable connection
with it.
After the scan is complete, the counties will re ect all re ected
targets to see whether clients are connected to them, whether the
network announces WPS usage, and what type of encryption the
network uses. Based on this, the hacker chooses any target, group or
all targets for attack based on the information collected.
Wi te2 will go through the entire list of goals, starting with the fastest
and simplest attacks, such as WPS-Pixie, which can crack a password
in a matter of seconds, to less reliable tactics, such as checks for
using weak passwords using a dictionary attack. If the attack fails or
its completion takes too much time, then Wi te2 will proceed to the
next possible attack in a particular case, so as not to waste time, as
its predecessor did.
WiFite installation
The program is preinstalled in Kali Linux, additionally install the
programs:
Linux installation
Required dependencies:
cd wifite2
sudo ./Wifite.py
In a typical launch, Wi te will only ask the user one time: which
access points should they attack?
You can run Wi te so that it will not even ask it — it will attack every
TD. You can specify a dictionary le — and the program will
completely autonomously send deauthentication packets, grab
handshakes, sort through passwords, sort through WPS pins and try
to use WPS PixieDust, conduct various attacks on WEP. Moreover, the
program will launch an attack on the weakest technologies and, in
case of failure, move on to more secure ones.
cp /usr/share/wordlists/rockyou.txt.gz .
gunzip rockyou.txt.gz
Some more theory. WiFite is a “full cycle” program for hacking WiFi
access points. it does everything well, but such a stage as brute force
passwords can be done not only well — it can be done perfectly well.
Passwords can be signi cantly accelerated if Pyrit is used , but it
requires certain skills.
Let’s start with a very simple one — let WiFite do everything by itself.
To do this, you need to launch the WiFite program with two additional
options:
the next target took a few seconds to be cracked using WPS Pixie-
Dust :
WiFite output
WiFite — perhaps the best program for beginners. You can hack your
rst wireless access points with it without knowing anything about
handshaking, deauthentication, types of WiFi encryption and
technologies such as WEP, WPS. Personally, my rst successful
experience, which made me believe in myself and had awakened my
interest in this topic, is connected with the wi te program.
The best way to protect your network from tools like Wi te2 is to
make sure that you have WPS turned off, and choose a very strong
password for your WiFi network that you will not tell anyone.
We hope you enjoyed this guide to automating the WiFi hacking with
Wi te2. If you have any questions about this article or about WiFi
hacking tools — feel free to write in the comments.