Cool Stuff:
- sorts targets by power (in dB); cracks closest access points first
- automatically deauths clients of hidden networks to decloak SSIDs
- numerous filters to specify exactly what to attack (wep/wpa/both, above certain signal strengths, channels, etc)
- customizable settings (timeouts, packets/sec, channel, change mac address, etc)
- all WPA handshakes are backed up to wifite.py's current directory
- smart WPA deauthentication -- cycles between all clients and broadcast deauths
- stop any attack with Ctrl+C -- options: continue, move onto next target, skip to cracking, or exit
- switching WEP attack methods does not reset IVs
- SKA support (untested)
- displays session summary at exit; shows any cracked keys
- all passwords saved to log.txt
- built-in updater: "./wifite.py -upgrade" not automatic
Hope you like it :)
looks handy, but very complex.
ReplyDeleteOh neat... I may have to try this out sometime.
ReplyDelete