Skip to content
forked from kimocoder/wifite2

Rewrite of the popular wireless network auditor, "wifite" - original source by @derv82 maintained by kimocoder. Hashcat TCP part contributed by wvthoog

License

Notifications You must be signed in to change notification settings

wvthoog/wifite2

 
 

Repository files navigation

Android Supported GitHub license

Wifite and Hashcat over TCP

This repo is a fork of wifite from kimocoder which uses a backend Hashcat server to crack captured 4-way handhakes.

A more lengty tutorial can be found here

Build and install Pyhashcat and Hashcat

Install the Pyhashcat library together with Hashcat version 6.1.1

$ git clone https://github.com/f0cker/pyhashcat.git
$ cd pyhashcat/pyhashcat
$ wget https://github.com/hashcat/hashcat/archive/refs/tags/v6.1.1.zip
$ unzip v6.1.1.zip && mv hashcat-6.1.1 hashcat
$ cd hashcat
$ sudo make install_library
$ sudo make install
$ cd ..
$ python3 setup.py build_ext -R /usr/local/lib
$ sudo python3 setup.py install

Install dependencies

Install the dependencies needed for Wifite to run

$ sudo apt install aircrack-ng tshark hcxtools hcxdumptool reaver bully cowpatty macchanger -y

pytest-flake8

$ pip3 install -r requirements.txt

Clone Wifite

$ git clone https://github.com/wvthoog/wifite2.git
$ cd wifite2

Server side (Kali)

Run the file Server.py on the server side on a host which has a Nvidia GPU and the CUDA toolkit installed

$ python3 Server.py --ip 192.168.1.5 --port 4000 --password testing123 --wordlist rockyou.txt
$ usage: Server.py [-h] --ip IP --port PORT --password PASSWORD --wordlist WORDLIST

optional arguments:
  -h, --help           show this help message and exit
  --ip IP              IP address of the server
  --port PORT          Listening port of the server
  --password PASSWORD  Set the password for the server
  --wordlist WORDLIST  Wordlist to used for cracking

Starting up Server.py script on the server side

Android side (Nethunter)

Run the file Server.py on the

python3 Wifite.py --wpa --tcp-hashcat --hostname 192.168.1.5 --port 5000 --password testing123 --no-wps --no-pmkid
$ usage: Wifite.py [-h] --wpa --ip IP --port PORT --password PASSWORD --wordlist WORDLIST --no-wps --no-pmkid

optional arguments:
  --wpa                Target WPA enabled networks
  --ip IP              IP address of the server
  --port PORT          Listening port of the server
  --password PASSWORD  Password for the server
  --no-wps             Don't use WPS against the target
  --no-pmkid           Don't use PMKID against the target

Launching Wifite with Hashcat over TCP on a Nethunter phone

About

Rewrite of the popular wireless network auditor, "wifite" - original source by @derv82 maintained by kimocoder. Hashcat TCP part contributed by wvthoog

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Python 60.5%
  • Perl 18.5%
  • C 13.6%
  • C++ 4.7%
  • Assembly 1.9%
  • Makefile 0.4%
  • Other 0.4%