Nice script, easy to use, logical in execution - ran into a few issues..
2 Test AP's, both with clients, loaded WPA2 password into wpa.txt
[0:00:00] started cracking WPA key for "testarg1-noconnect"; using /pentest/passwords/wordlists/wpa.txt (35072355 passwords)
[0:00:05] cracking; 1085.92 k/s; 4168 keys total; 0% eta: 8:58:40
[0:00:05] cracked "testarg1-noconnect"! the key is: "thisisthepassword"
Traceback (most recent call last):
File "./wifite.py", line 2708, in <module>
main() # launch the main method
File "./wifite.py", line 714, in main
File "./wifite.py", line 1344, in wpa_crack
CRACKED += 1
UnboundLocalError: local variable 'CRACKED' referenced before assignment
script is unable to move onto finding the next password - no huge deal for pentesting (how many WPA AP's would you try to guess the password for anyway?) but it's there.
Saves time, nice work.
Also, guessing time is diminished by about 100 - 120 tries a sec in GUI mode - I really prefer the console version anyway.
Hope the feedback helps -
Setup is BT4 R1, HD install (dell vostro), qty 2 rtl8187L USB wifi