Releases: derv82/wifite2
--pmkid-timeout option, increased default to 30seconds.
Previous timeout for PMKID capture was 15 seconds. This was increased to 30 seconds by-default.
Users can specify the time to wait using --pmkid-timeout X, where X is the number of seconds to wait.
More options on Ctrl+C, Small fix for bully
When interrupting an attack, users can choose to:
- continue attacking the same target with remaining attacks,
- skip to the next target, or
- exit Wifite.
Other small changes:
- Wifite passes
--forceinto Bully to bypass warnings - Wifite detects when
--wps-onlyand--pmkidare both specified, and exits with an error message.
Bringing back WPS PIN Attack
In this version, Wifite will attempt the WPS PIN attack (guessing < 11,000 PINs) after Pixie-Dust fails on WPS-enabled networks.
Wifite summarizes the Reaver (or Bully) output into a single line (updated every second). This includes:
- Number of PINs tried (Number of PINs remaining for
--bully) - Time running (or estimated time remaining for
--bully) - Current status (Trying a PIN, sending packets, etc)
- The number of WPS Timeouts, number of WPS Failures, and if the AP is locked.
There's some new options as well:
--bullyto usebullyinstead ofreaverwhen doing the Pixie-Dust or PIN Attacks.--pixieto avoid the PIN attack and use Pixie-Dust only.--no-pixieto skip Pixie-Dust and only do WPS PIN attacks.
Some other changes regarding "Locked" WPS networks:
- Locked networks are no longer hidden; these targets say
lockin the WPS column of the targets list. - Wifite will stop WPS attacks (Pixie or PIN) if the AP is Locked.
- But you can continue attacking Locked networks using the
--ignore-lockoption.
- But you can continue attacking Locked networks using the
Improvements to --crack, fixes for installed wordlist
--crack improvements:
- Supports
john,hashcat,aircrack, orcowpatty- Pyrit appears to not work for me at all right now, even after downgrading scapy (see [this thread]
- Only passes
--forceintohashcatif no devices are found.(JPaulMora/Pyrit#558 (comment))).
- Only shows available tools, explains why some tools are unavailable (missing dependencies).
- Accepts
allas input when selecting handshakes. - Avoids writing the same cracked password to
cracked.txtif it's already been cracked (same bssid, essid, password, handshake, everything).
Wordlist location when using sudo python setup.py install did not match the wordlists checked by the config. Fixed in this version.
Setup.py integration
Semi-major version bump for significant changes:
- Wifite can be installed using setup.py (
sudo python setup.py install)- This installs
wifiteas a python module to the machine. - Includes an executable script in
/usr/sbin/wifite
- This installs
- The base script
./Wifte.pywas moved tobin/wifite- But this script can't be executed via
python bin/wifiteunless wifite is installed.
- But this script can't be executed via
To run wifite:
- If installed, just type
sudo wifiteat any terminalwifiteshould be found in the current path as it's installed to/usr/sbin
- If not installed (e.g. git cloned), type
sudo python -m wifitein the clone repo directory.
New "--pmkid" option. Improvements to "--crack" feature.
--pmkid option will only attack WPA networks with the new PMKID capture + crack attack
- This option avoids the WPS Pixie-Dust and WPA 4-Way Handshake capture attacks.
Improvements to --crack feature:
- Allows selecting multiple handshakes to crack in bulk.
- Includes captured PMKID "handshakes" (PMKID hash stored in
*.16800files in thehsdirectory). - If wordlist (
--dict) is not found, prompts user to enter a wordlist file. - Note:
--cracklonger prints different ways to crack handshakes (Hashcat/Pyrit/Cowpatty/Aircrack/etc).- Wifite will try to crack the handshakes instead.
- Cracks WPA 4-Way Handshakes using
aircrack-ng - Cracks PMKID "handshakes" using
hashcat. - TODO An option to print the commands to crack (as one-liners that can be pasted into terminal)
- TODOs Options to allow users to specify the cracking methods (hashcat + cuda, pyrit, etc).
Other changes:
--crackwill show cracked results with one target per-line (improves readability).- Large refactoring of the code base may introduce new bugs.
Fix for when hashcat tools are missing.
From #124, Wifite crashes during the PMKID attack if hashcat or hcxdumptool or hcxpcaptool are missing.
This release fixes the crash; wifite will avoid the PMKID attack if any of the tools are missing.
PMKID attack. Other fixes.
PMKID Attack
More info on the PMKID attack: wifite2/PMKID.md
- Not tested very thoroughly
- Wifite does not detect if the installed version of
hashcatcan support-m 16800(the PMKID hash attack).- Needs
haschat v4.1.2or higher.
- Needs
- Requires
hcxdumptooland andhcxpcaptool
Fixes
- Attempted to fix
Airodump was stoppederrors (alsoAttributeErrorwithProcess.__del__and other similar errors)- Problem occurred when user presses
ctrl+cwhile Wifite is analyzing the latest packets (which is every second!).
- Problem occurred when user presses
- Various other fixes that hopefully avoid crashes mentioned in the Issues.
Improvements
- Included a small wordlist (4800 from berzerk0/Probable-Wordlists/Real-Passowrds/WPA-Length)
v2.1.6: Support non-ASCII ESSIDs.
2.1.6:
- Support non-ASCII ESSIDs (e.g. Unicode/UTF8).
2.1.5:
- Leave devices in Monitor Mode at exit (informs user).
--keep-ivsoption to retain IVS files between attacks (#27)
2.1.4:
- Fix bug in
macchanger - More-stable parsing of
airmon-ngoutput
2.1.3:
- Do not restart NetworkManager when finished (informs user)
- Changes to CLI switches:
--wps-time X: Total time for WPS attack to complete--wps-timeouts X: Max number of timeouts before failing--wps-fails X: Max number of WPSFails before failing- Removed unused WPS switches.
- Improved
--helpmessaging for WPS switches. - Fail/Timeout threshold default is
100
- Bully now outputs useful information:
- Current PIN + status
- Time remaining
- Number of Timeout messages
- Number of "WPSFail" messages
- If AP is locked
- Better reaver output.
- Looks more like Bully's output.
- Timer shows time remaining for attack.
- Mentions "Running pixiewps" during "M2 message" step.
pixiewpsfailure looks like this:"Reaver says: 'WPS pin not found'"- Counts Timeouts and "WPS Transaction Failure" (WPSFail)
2.1.2:
- Quieter
--helpmessage, full help available with--help -vor-hv - Quiet decloak. Support ESSIDs with commas and trailing spaces
- Decloaked ESSIDs will have a "*" next to their name. For #78
- Fixed ESSID parsing caused by Airodump's CSV format.
- Also fixed hidden ESSID detection introduced by the new CSV parsing logic.
2.1.1:
- Option to ignore APs without clients (
--clients-onlyor-co)
Ready for Beta Testing
Now that I have the script working consistently on my machine, it's time to open up to Beta & start fixing bugs other users are seeing.