Warriors.to Underground Forum - Hack Forum - Leak Forum
  • Home
  • Forums
    New posts Search forums
  • Resources
    Latest reviews Search resources
  • Members
    Current visitors New profile posts Search profile posts
  • Awards
  • Chat 0
Log in Register
What's new Search

Search

By:
Advanced search…
Warriors.to Underground Forum - Hack Forum - Leak Forum
    • Home
    • Forums
    • Underground
    • Wireless Hacking/Security
  • Home
  • Forums
  • Underground
  • Wireless Hacking/Security
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an alternative browser.

Wireless Penetration Testing: Wifite (part 2)

  • Thread starter Lexter
  • Start date Nov 30, 2022
L

Lexter

Member
Messages
27
Joined
Nov 30, 2022
Reaction score
21
Points
3
wCoin
508
  • Nov 30, 2022
  • #1

WPA/WPA2 Handshake Capture​


We have talked about handshakes in detail in our previous article
Please, Log in or Register to view URLs content!
. Let’s see how we can capture handshakes using wifite.
Here, we’ll simply type in the name of the tool since the default function is to scan the networks.
But we’ll add the –skip-crack option here which will stop the tool to crack any handshake that it captures

wifite --skip-crack

8.png


How tool works – As you might have observed in the screenshot that the tool is automatically trying all the attacks against a specified target. Here, I specified target “1” for my AP (”raaj”) and you can see that it has tried for PMKID attack first, been unsuccessful and then launched handshake capture. This process will be the same for any target. The tool will automatically determine which attack works. Quite simple and hassle-free!

Here, we have successfully captured a handshake and saved it in a location: /root/hs/<name>.cap
Now, if we don’t use the skip-crack flag along with the command, the chain would look something like this:

wifite
Target: 1

9.png

Chain:
  • Identify APs
  • Check protocol
  • Attempt PMKID attack
  • Attempt handshake attack
  • If handshake found -> crack

And very evidently so, you can see that it has cracked the handshake file and given out the password as “raj12345”
It uses aircrack-ng’s dictionary attack module in the background.

Some useful options​

Filtering Attacks: What if I want to skip out the PMKID step from the chain above? We can do this by:

wifite --no-pmkid

10.png



Scan Delay: Another useful option is to give a scan time delay. This may be used in parallel to other options to evade security devices that have set a timeout for unauthenticated packets.


wifite -p 10

Here, the tool will put a delay of 10 seconds before attacking the targets


11.png



And now the tool is putting a delay of 10 seconds after every target
PMKID timeout: This flag would enable us to set a timeout delay between each successful RSN packet request to the access point

wifite --pmkid-timeout 130

12.png



Observe how there is a timeout of 130 seconds. I’ve been interrupted before 130 seconds by C TRL+C to stop the attack. Note how it says ”waiting for PMKID (1m 23s)”


13.png



Stop deauthentication on a particular ESSID: This flag will stop the tool from conducting client deauthentication (often used in handshake captures). In a list of targets I want to stop preventing my tool to conduct deauthentication, this would yield useful


wifite -e raaj --nodeauths

-e : ESSID (name of AP)


14.png



Targeting only WPA networks: This flag helps us identify WPA only and attack the targets


wifite --wpa

15.png



Ignore present handshakes: Oftentimes we want a fresh start or our handshakes are just not behaving the way we want. For those times, we have a handy feature of ignoring the existing handshakes and capturing rather fresh or new ones.


wifite --new-hs

16.png



Supplying custom dictionary: For our dictionary attacks, if we want to supply a custom wordlist we can do that within the tool’s interface too. This is done by the “dict” flag
wifite --dict /root/dict.txt

17.png

Now, setting the target as above, we see that dictionary infact works

18.png



Display cracked APs: To display a complete list of already cracked targets fetched from the tool’s database, we have the command:


wifite --cracked

19.png



Validating handshakes: Now, if we want to verify the existing handshakes that we have already captured against a wide variety of Wireless Auditing tools we can do so by:


wifite --check

20.png



Great, now I can proceed with tshark now!


Cracking handshake file: The list of handshake files we have captured is with us now. What if I want to modify the cracking tool and not use the default one. It can be done using:
wifite --cracked

Choose target and tool afterwards
21.png

And as you can see that aircrack has cracked password “raj12345”

Killing conflicting processes: This flag helps us kill all the jobs that may conflict with the working of the tool. It’s a great little cleanup technique before starting the tool
wifite --kill

22.png



MAC Spoofing: MAC Address spoofing is a great technique to evade analyst’s vision and avoid getting caught by supplying the real MAC ID of your Wi-Fi adapter. First, we see our wifi card’s MAC ID by ifconfig
Note this MAC ID ends in 5C. That’s all we need to visualize if MAC is being spoofed or not.
Now we spoof this MAC ID by wifite command:


wifite --random-mac

25.png


Observe how this new MAC ID ends in 09. This means that spoofing has been done successfully and a random MAC has been put on the interface.
Now, after our job is done, this option will automatically reset the MAC ID too. Very efficient.
26.png


Power filter: Access Points that are far away often don’t behave well while being attacked. There’s a lot of noise, attenuated signals and obviously packet drops while communicating. So to be safe we’ll set a power threshold so that we can only scan WiFis closer to us and whose power is enough to be communicated with without any errors like in WiFis that are attenuated.

Note that this value is in decibels. Let’s set a threshold of 35db.
wifite --power 35

27.png


Now only the APs with 35db or more strength will be visible.
 
  • Like
Reactions: Majesty
You must log in or register to reply here.
Share:
Facebook X (Twitter) Reddit Pinterest Tumblr WhatsApp Email Share Link
  • Home
  • Forums
  • Underground
  • Wireless Hacking/Security


About Warriors.to

It is a real Turkish hacking forum. It was established in 2022 and its aim is to respond to the attacks against Turkey and gather Turkish hackers under one roof.
Gerçek Türk Hack Forumudur. 2022 yılında kurulmuş olup amacı Türkiye'ye yönelik saldırılara karşılık vermek ve Türk hackerları tek çatı altında toplamaktır.

Forum Navigation

  •   Yönetici Listesi
  •   Üye Listesi
  •   Arama Yap

Yardım

  •   Forum Dökümanları

Hesap

  •   Kontrol Panel
  • English (US)
  • Contact us
  • Help
  • Home
  • RSS
Theme Made by W4H9LT 
Advanced Forum Stats, Awards System by AddonFlare - Premium XF2 Addons
Some of the add-ons on this site are powered by XenConcept™ ©2017-2025 XenConcept Ltd. (Details)
| Xenforo Add-ons © by ©XenTR
Top Bottom