Warriors.to Underground Forum - Hack Forum - Leak Forum
  • Home
  • Forums
    New posts Search forums
  • Resources
    Latest reviews Search resources
  • Members
    Current visitors New profile posts Search profile posts
  • Awards
  • Chat 0
Log in Register
What's new Search

Search

By:
Advanced search…
Warriors.to Underground Forum - Hack Forum - Leak Forum
    • Home
    • Forums
    • Underground
    • Wireless Hacking/Security
  • Home
  • Forums
  • Underground
  • Wireless Hacking/Security
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an alternative browser.

Wireless Penetration Testing: Wifite (part 1)

  • Thread starter Lexter
  • Start date Nov 30, 2022
L

Lexter

Member
Messages
27
Joined
Nov 30, 2022
Reaction score
21
Points
3
wCoin
508
  • Nov 30, 2022
  • #1

Introduction​

Wifite is a wireless auditing tool developed by Derv82 and maintained by kimocoder. You can find the original repository
Please, Log in or Register to view URLs content!
. In the latest Kali Linux, it comes pre-installed. It’s a great alternative to the more tedious to use wireless auditing tools and provides simple CLI to interact and perform wireless attacks. It has great features like 5GHz support, Pixie Dust attack, WPA/WPA2 handshake capture attack and PMKID attack as well.

Basic Filters​

We can launch this tool by simply typing the name of the tool. To view the help page we have a -h flag


1.png



As you can see there are various options in the help menu here. We’ll try a few of these in this article.


Let’s first see which wireless network I’m connected to currently


wifite -i wlan0

2.png



My access point is on channel 10. Let’s see what all access points are operating on the same channel


wifite -c 10

3.png



Here, you can see that monitor mode is being auto-enabled while scanning. Wifite has detected two more networks on channel 10.


Let’s try to add one more channel to the scanning list


wifite -c 10,6

4.png



Ahh, the results have increased now. Now let’s filter out only the access points with clients connected.


wifite --clients-only

5.png



You can see that wifite has detected 2 APs with clients connected.


ARP Replay Attack against WEP protocol​


Now let’s say we have done whatever we wanted to with our wifi adapter and we want to change it from monitor mode to managed mode (default mode) after we stop using wifite. We can do this by:


wifite --daemon

6.png



The next filter is to find all the networks around me that are running on WEP protocol and perform a quick Replay Attack against them.


Replay attack: In this attack, the tool tries to listen for an ARP packet and sends it back to the access point. This way AP will be forced to create a new packet with new initialization vector (IV – starting variable to encrypt something). And now the tool would repeat the same process again till the time data is enough to crack the WEP key.


This can be done by:


wifite --wep

Then,


ctrl+c to stop scanning


choose target. Here, 1


7.png



As you can see that after 20 thousand plus replay packets, the tool has found the key successfully and saved it in a JSON file.
Please note that WPA implements a sequence counter to protect against replay attacks. Hence, it is recommended not to use WEP.

In part 2 we will see WPA/WPA2 handshake capture.



​

 
  • Like
Reactions: Majesty
You must log in or register to reply here.
Share:
Facebook X (Twitter) Reddit Pinterest Tumblr WhatsApp Email Share Link
  • Home
  • Forums
  • Underground
  • Wireless Hacking/Security


About Warriors.to

It is a real Turkish hacking forum. It was established in 2022 and its aim is to respond to the attacks against Turkey and gather Turkish hackers under one roof.
Gerçek Türk Hack Forumudur. 2022 yılında kurulmuş olup amacı Türkiye'ye yönelik saldırılara karşılık vermek ve Türk hackerları tek çatı altında toplamaktır.

Forum Navigation

  •   Yönetici Listesi
  •   Üye Listesi
  •   Arama Yap

Yardım

  •   Forum Dökümanları

Hesap

  •   Kontrol Panel
  • English (US)
  • Contact us
  • Help
  • Home
  • RSS
Theme Made by W4H9LT 
Advanced Forum Stats, Awards System by AddonFlare - Premium XF2 Addons
Some of the add-ons on this site are powered by XenConcept™ ©2017-2025 XenConcept Ltd. (Details)
| Xenforo Add-ons © by ©XenTR
Top Bottom