top of page
Search
  • Writer's pictureotw

Wi-Fi Hacking: Using wifite for Multiple Attack Strategies against Wi-Fi AP's

Updated: Dec 28, 2022

Welcome back, my aspiring cyberwarriors!


Often, when doing a pentest, we have multiple Wi-Fi access points to test for security. Rather than testing each one individually with tools such as aircrack-ng, Reaver, pyrit, and hcxdumptool, and others, we can automate that testing with a single tool such as wifite. Wifite enables us to test all of the Wi-Fi AP's with a single tool automatically using multiple strategies against different security protocols.



wifite can test the security of;


  1. WEP

  2. WPA

  3. WPA2-PSK

  4. WPS

In addition, wifite is capable of using multiple tools and strategies in these attacks such as;


  1. Reaver

  2. Bully

  3. pyrit

  4. PMKID and others


wifite is built into the latest versions of Kali, but if you are using another version or another platform, you can easily download it from the Kali repository such as;


kali > sudo apt install wifite





Step #1: wifite help


To begin, let's take a look at wifite's help screen.


kali > sudo wifite -h


Although there are many options in his tool, in general, you can use it simply by entering the command, wifite, at the command-line like below.

Note that when we do so, it states that pyrit, hcxdumptool and hcxpcaptool are not installed. We can run wifite without these as we have aircrack-ng and Reaver installed by default, but let's take a minute to install these other tools as well.




For more on using these tools in the PMKID attack, click here.


Step #2: Kill Conflicting Processes


In addition, wifite recommends that we use the --kill option to stop potentially conflicting processes.


kali > sudo wifite --kill



Now hit Ctrl+C on your keyboard to begin attacking the Wi-Fi AP's.


Step #3: Select Target


After you hit the Ctrl+C on your keyboard, wifite asks you to select a target. I selected 1 or the SSID, hug2g858469.


As soon as I select my target, wifite begins the process of capturing the WPA2 4-way handshake. As you can see above, the handshake was captured by tshark and NOT aircrack.


Once the handshake is captured, wifite begins the cracking process using its default password list, wordlist-probable.txt.

After just a few minutes, wifite accepts defeat and states that the wordlist did NOT contain the password.


Step #4: Using a Custom Password List


The outcome in Step #3 was not unexpected. The default wordlist is small and therefore very limited. Let's attempt to use some larger and custom wordlists.


For more on custom wordlists, check out this tutorial from the Mr Robot Hacks section.


To use these custom wordlists, simply use the --dict switch in the command line followed by the location of your wordlist, such as;


kali > sudo wifite --dict /home/kali/top10000_passwords.txt


Here, I am using a my top10000_password list you can find here at Hackers-Arise. I strongly recommend that you use these common password lists before progressing to the massive multi-million word lists that many use and can take hours to days to exhaust.


After hitting ENTER, wifite will search and find all the available AP's in the area and list them. To start the cracking process, once again enter Ctrl+C on your keyboard and then enter the number of the target AP.


Now, wifite begins the cracking process with the new wordlist. As you can see in the screenshot above, wifite successfully cracked the AP Pre-Shared Key (PSK)!


Summary


When conducting a wireless penetst, wifite can save you time and headache by automating the testing process. Capable of cracking WEP, WPA2-PSK and WPS, wifite is an essential tool in the hacker/penester/cyberwarriors toolbox!


4 Comments


astriddavina54
astriddavina54
Jan 03, 2023

Do you suspect your spouse of cheating, are you being overly paranoid or seeing signs of infidelity…Then he sure is cheating: I was in that exact same position when I met Henry through my best friend James who helped me hack into my boyfriend’s phone, it was like a miracle when he helped me clone my boyfriend’s phone and I got first-hand information from his phone. Now I get all his incoming and outgoing text messages, emails, call logs, web browsing history, photos and videos, instant messengers(facebook, whatsapp, bbm, IG etc) , GPS locations, phone taps to get live transmissions on all phone conversations. if you need help contact his gmail on , Henryclarkethicalhacker@gmail.com, and you can also , whatsap…


Like

Hire a professional cell Phone Hacker who has the skills that can grant you remotely access to your spouse cell phone and grant access to cheating spouse cell phone information on their cell phone. He can also use he skills to spy on other people’s cell phones device. It is also known as a cell phone spy who are capable to provide you all you require to infiltrate any type of smartphone and iPhone. I was able to got access to partner iPhone, the job was prefect to the extended he didn’t knowing anything about it, was so prefect you can conatct him via kelvinethicalhacker @ gmail. com. reach to him to help spy on your cheating spouse.

Like

Dictionaries present on kali linux may be old, is there any link which has recent password trends dictionary?

Like

The way you explain and show result make it very easy to learn or should I just say use and learn along the way. Thank you

Like
bottom of page