Page 1 of 2 12 LastLast
Results 1 to 10 of 15

Thread: wifite - mass wep/wpa cracker for backtrack4

Hybrid View

  1. #1
    Junior Member SWFu64's Avatar
    Join Date
    Jan 2010
    Posts
    97

    Default wifite - mass wep/wpa cracker for backtrack4

    yeah, I know it's yet another autopwn script, but this one actually works pretty damn well!

    --------------------------------------------

    introduction
    designed for Backtrack4 RC1 distribution of Ubuntu. Linux only; no windows or osx support.

    purpose
    to attack multiple WEP and WPA encrypted networks at the same time. this tool is customizable to be automated with only a few arguments. can be trusted to run without supervision.

    wifite - Project Hosting on Google Code
    "I do not know with what weapons World War III will be fought, but World War IV will be fought with sticks and stones."

    Albert Einstein

  2. #2
    Just burned his ISO
    Join Date
    Sep 2010
    Posts
    9

    Default Re: wifite - mass wep/wpa cracker for backtrack4

    Nice script, easy to use, logical in execution - ran into a few issues..

    2 Test AP's, both with clients, loaded WPA2 password into wpa.txt

    [0:00:00] started cracking WPA key for "testarg1-noconnect"; using /pentest/passwords/wordlists/wpa.txt (35072355 passwords)
    [0:00:05] cracking; 1085.92 k/s; 4168 keys total; 0% eta: 8:58:40
    [0:00:05] cracked "testarg1-noconnect"! the key is: "thisisthepassword"
    Traceback (most recent call last):
    File "./wifite.py", line 2708, in <module>
    main() # launch the main method
    File "./wifite.py", line 714, in main
    wpa_crack(i)
    File "./wifite.py", line 1344, in wpa_crack
    CRACKED += 1
    UnboundLocalError: local variable 'CRACKED' referenced before assignment

    ********
    script is unable to move onto finding the next password - no huge deal for pentesting (how many WPA AP's would you try to guess the password for anyway?) but it's there.


    Saves time, nice work.
    Also, guessing time is diminished by about 100 - 120 tries a sec in GUI mode - I really prefer the console version anyway.

    Hope the feedback helps -


    Setup is BT4 R1, HD install (dell vostro), qty 2 rtl8187L USB wifi

  3. #3
    Junior Member SWFu64's Avatar
    Join Date
    Jan 2010
    Posts
    97

    Default Re: wifite - mass wep/wpa cracker for backtrack4

    Theres been some bug fixes, update.
    "I do not know with what weapons World War III will be fought, but World War IV will be fought with sticks and stones."

    Albert Einstein

  4. #4
    Just burned his ISO
    Join Date
    Sep 2010
    Posts
    9

    Default Re: wifite - mass wep/wpa cracker for backtrack4

    Quote Originally Posted by SWFu64 View Post
    Theres been some bug fixes, update.
    Updating was the first thing I did after looking through your code and before using the app and reporting. Ran with the -update switch, said it was allready at the latest version.

  5. #5
    Junior Member
    Join Date
    Feb 2010
    Location
    USA
    Posts
    47

    Default Re: wifite - mass wep/wpa cracker for backtrack4

    Yea, I hadn't received any bug reports until a few hours ago. One guy reported like 10 issues and they were all relevant. I was able to patch them all including that huge bug Casca ran into above (error when WPA key is found).

    Just FYI: The script can upgrade itself...
    Code:
    ./wifite.py -upgrade
    I want people to use Wifite instead of GrimWepa since GW has become a huge pain in the ass to trouble-shoot -- it has thousands of lines of code, Java, ~15 classes.. it's a nightmare! I thought about making a prettier GUI for Wifite and calling it GrimWepa2, but I just don't have the time.

    P.S. Thanks for requesting this be added to BT4... It's always nice when something I've worked on gets exposure!

  6. #6
    Just burned his ISO
    Join Date
    Sep 2010
    Posts
    9

    Default Re: wifite - mass wep/wpa cracker for backtrack4

    Quote Originally Posted by derv82 View Post
    Yea, I hadn't received any bug reports until a few hours ago. One guy reported like 10 issues and they were all relevant. I was able to patch them all including that huge bug Casca ran into above (error when WPA key is found).

    Just FYI: The script can upgrade itself...
    Code:
    ./wifite.py -upgrade
    I want people to use Wifite instead of GrimWepa since GW has become a huge pain in the ass to trouble-shoot -- it has thousands of lines of code, Java, ~15 classes.. it's a nightmare! I thought about making a prettier GUI for Wifite and calling it GrimWepa2, but I just don't have the time.

    P.S. Thanks for requesting this be added to BT4... It's always nice when something I've worked on gets exposure!

    OK, tried again after re-updating and the error is gone, moves on to the next WPA network no worries.

    Re-setup the test AP's for WEP and it was no contest - very clean and logically progressive attack with no wasted time. Nice no BS progression in console mode. The packetforge implementation is particularly cool and quite effective.

  7. #7
    Just burned his ISO
    Join Date
    Sep 2010
    Posts
    1

    Default Re: wifite - mass wep/wpa cracker for backtrack4

    only install this packt
    PHP Code:
    apt-get install python-tk 

  8. #8
    Junior Member
    Join Date
    Feb 2010
    Location
    USA
    Posts
    47

    Default Re: wifite - mass wep/wpa cracker for backtrack4

    Archangel,

    This is now on my Todo list. I will (eventually) add an option to "press any key to close this window" or "press y to relaunch wifite". It's been added as an Enchancement request to the issues section.

    Thanks.

  9. #9
    Member
    Join Date
    Mar 2010
    Posts
    87

    Default Re: wifite - mass wep/wpa cracker for backtrack4

    seems interesting. any plans to include crunch with this? I currently use crunch output to pyrit.

  10. #10
    Just burned his ISO
    Join Date
    Aug 2010
    Posts
    1

    Default Re: wifite - mass wep/wpa cracker for backtrack4

    Love this script! anyways..is there any possibility to add a way to just "crack a wpa/wpa2 network" Im mean like after you've already captured your handshake, you could come back to the gui later and and start the cracking process (by way of a locate .cap or .pcap file) like you see on some of the WPA crackers online? If so, i think it would be a nice touch

Page 1 of 2 12 LastLast

Similar Threads

  1. Fast-Track Mass Client Issues
    By bandannaproof in forum OLD Newbie Area
    Replies: 0
    Last Post: 01-01-2010, 01:45 AM
  2. AirJAM - Wireless mass FakeAPs flooder
    By GregWar in forum OLD Programming
    Replies: 0
    Last Post: 08-28-2009, 12:11 PM
  3. Fast-Track Mass Client Attack e S.O.
    By c0mm4nd in forum Supporto Software
    Replies: 4
    Last Post: 08-27-2009, 03:13 PM
  4. Mass Client Side
    By opreat0r in forum OLD Tutorials and Guides
    Replies: 15
    Last Post: 10-05-2008, 10:48 PM
  5. mass client attack - ettercap filter
    By BigMac in forum OLD Newbie Area
    Replies: 1
    Last Post: 07-20-2008, 12:11 AM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •