wifite man page on Kali

Man page or keyword search:  
man Server   9211 pages
apropos Keyword Search (all sections)
Output format
Kali logo
[printable version]

WIFITE(1)							     WIFITE(1)

NAME
       wifite  - Python script to automate wireless auditing using aircrack-ng
       tools

SYNOPSIS
       wifite [SETTINGS] [FILTERS]

DESCRIPTION
       Wifite is a tool to audit WEP or WPA encrypted wireless	networks.   It
       uses aircrack-ng, pyrit, reaver, tshark tools to perform the audit.

       This tool is customizable to be automated with only a few arguments and
       can be trusted to run without supervision.

COMMANDS
	 -check <file>	   check capfile <file> for handshakes.
	 -cracked	   display previously-cracked access points

GLOBAL
	 -all	      attack all targets.	       [off]
	 -i <iface>   wireless interface for capturing [auto]
	 -mac	      Changes MAC address of 'iface' to a random MAC. [off]
	 -c <channel> channel to scan for targets      [auto]
	 -e <essid>   target a specific access point by ssid (name)  [ask]
	 -b <bssid>   target a specific access point by bssid (mac)  [auto]
	 -showb	 display target BSSIDs after scan		[off]
	 -pow <db>    attacks any targets with signal strenghth > db [0]
	 -q -quiet    do not print list of APs during scan	     [off]

WPA
	 -wpa	      only target WPA networks (works with -wps -wep)	[off]
	 -wpat <sec>  time to wait for WPA attack to complete (seconds) [500]
	 -wpadt <sec> time to wait between sending deauth packets (sec) [10]
	 -strip	 strip handshake using tshark or pyrit		   [off]
	 -crack <dic> crack WPA handshakes using <dic> wordlist file	[off]
	 -dict <file> specify dictionary to use when cracking WPA [phpbb.txt]
	 -aircrack    verify handshake using aircrack [on]
	 -pyrit	 verify handshake using pyrit	 [off]
	 -tshark verify handshake using tshark	 [on]

WEP
	 -wep	      only target WEP networks [off]
	 -pps <num>   set the number of packets per second to inject [600]
	 -wept <sec>  sec to wait for each attack, 0 implies endless [600]
	 -chopchop    use chopchop attack      [on]
	 -arpreplay   use arpreplay attack     [on]
	 -fragment    use fragmentation attack [on]
	 -caffelatte  use caffe-latte attack   [on]
	 -p0841	 use -p0841 attack	  [on]
	 -hirte	 use hirte (cfrag) attack [on]
	 -nofakeauth  stop attack if fake authentication fails	  [off]
	 -wepca <n>   start cracking when number of ivs surpass n [10000]
	 -wepsave     save a copy of .cap files to this directory [off]

WPS
	 -wps			only target WPS networks	 [off]
	 -wpst -wpstime <sec>	max wait for new retry before  giving  up  (0:
       never)  [660]
	 -wpsratio  -wpsr  <per>  min  ratio  of successful PIN attempts/total
       tries	[0]
	 -wpsretry -wpsmaxr <num>    max number of retries for same PIN before
       giving up [0]

OTHERS COMMANDS
	 -upgrade     Checks for new version
	 -update Checks for new version

EXAMPLES
	 ./wifite.py -wps -wep -c 6 -pps 600

AUTHOR
       Dave M (derv82@gmail.com)

       This manual page was written by Daniel Echeverry <epsilon77@gmail.com>,
       for the Debian project (and may be used by others).

				  30/07/2012			     WIFITE(1)
[top]

List of man pages available for Kali

Copyright (c) for man pages and the logo by the respective OS vendor.

For those who want to learn more, the polarhome community provides shell access and support.

[legal] [privacy] [GNU] [policy] [cookies] [netiquette] [sponsors] [FAQ]
Tweet
Polarhome, production since 1999.
Member of Polarhome portal.
Based on Fawad Halim's script.
....................................................................
Vote for polarhome
Free Shell Accounts :: the biggest list on the net