Fully Automated Mass WPA / WEP Hacking with Wifite ( wifite.py ) converting the .cap File and resolving the WPA Key with oclHashcat-64
In this Tutorial you learn how to Capture a WPA2 Handshake with a GUI Powered Tool ( wifite.py ); later we upload the capture file to http://hashcat.net/cap2hccap/ to generate a .hccap file which we will crack with oclHashCat-64.
Some Informations about the Tools:
Wifite:
This project is available in French: all thanks goto Matt² for his excellent translation! sorts targets by power (in dB); cracks closest access points first automatically deauths clients of hidden networks to decloak SSIDs numerous filters to specify exactly what to attack (wep/wpa/both, above certain signal strengths, channels, etc) customizable settings (timeouts, packets/sec, channel, change mac address, ignore fake-auth, etc) "anonymous" feature; changes MAC to a random address before attacking, then changes back when attacks are complete all WPA handshakes are backed up to wifite.py's current directory smart WPA deauthentication -- cycles between all clients and broadcast deauths stop any attack with Ctrl+C -- options: continue, move onto next target, skip to cracking, or exit switching WEP attack methods does not reset IVs intel 4965 chipset fake-authentication support; uses wpa_supplicant workaround SKA support (untested) displays session summary at exit; shows any cracked keys all passwords saved to log.txt built-in updater: ./wifite.py -upgrade
Requirements
linux operating system (confirmed working on Ubuntu 8.10 (BT4R1), Ubuntu 10.04.1) tested working with python 2.4.5 and python 2.5.2; might be compatible with other versions, wireless drivers patched for monitor mode and injection: backtrack4 has many pre-patched drivers, aircrack-ng (v1.1) suite: available via apt: apt-get install aircrack-ng or by clicking here, xterm, python-tk module: required for GUI, available via apt: apt-get install python-tk macchanger: also available via apt: apt-get install macchanger pyrit: not required, optionally strips wpa handshake from .cap files oclHashcat-plus
Worlds fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker Worlds first and only GPGPU based rule engine Free Multi-GPU (up to 16 gpus) Multi-Hash (up to 24 million hashes) Multi-OS (Linux & Windows native binaries) Multi-Platform (OpenCL & CUDA support) Multi-Algo (see below) Low resource utilization, you can still watch movies or play games while cracking Focuses highly iterated, modern hashes Focuses single dictionary based attacks Supports pause / resume while cracking Supports reading words from file Supports reading words from stdin Integrated thermal watchdog 20+ Algorithms implemented with performance in mind
Fully Automated Mass WPA / WEP Hacking with Wifite ( wifite.py )
converting the .cap File and resolving the WPA Key with oclHashcat-64
In this Tutorial you learn how to Capture a WPA2 Handshake with a GUI Powered Tool ( wifite.py );
later we upload the capture file to http://hashcat.net/cap2hccap/ to generate a .hccap file which we will crack with oclHashCat-64.
Some Informations about the Tools:
Wifite:
This project is available in French: all thanks goto Matt² for his excellent translation!
sorts targets by power (in dB); cracks closest access points first
automatically deauths clients of hidden networks to decloak SSIDs
numerous filters to specify exactly what to attack (wep/wpa/both, above certain signal strengths, channels, etc)
customizable settings (timeouts, packets/sec, channel, change mac address, ignore fake-auth, etc)
"anonymous" feature; changes MAC to a random address before attacking, then changes back when attacks are complete
all WPA handshakes are backed up to wifite.py's current directory
smart WPA deauthentication -- cycles between all clients and broadcast deauths
stop any attack with Ctrl+C -- options: continue, move onto next target, skip to cracking, or exit
switching WEP attack methods does not reset IVs
intel 4965 chipset fake-authentication support; uses wpa_supplicant workaround
SKA support (untested)
displays session summary at exit; shows any cracked keys
all passwords saved to log.txt
built-in updater: ./wifite.py -upgrade
Requirements
linux operating system (confirmed working on Ubuntu 8.10 (BT4R1), Ubuntu 10.04.1)
tested working with python 2.4.5 and python 2.5.2; might be compatible with other versions,
wireless drivers patched for monitor mode and injection: backtrack4 has many pre-patched drivers,
aircrack-ng (v1.1) suite: available via apt: apt-get install aircrack-ng or by clicking here,
xterm, python-tk module: required for GUI, available via apt: apt-get install python-tk
macchanger: also available via apt: apt-get install macchanger
pyrit: not required, optionally strips wpa handshake from .cap files
oclHashcat-plus
Worlds fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker
Worlds first and only GPGPU based rule engine
Free
Multi-GPU (up to 16 gpus)
Multi-Hash (up to 24 million hashes)
Multi-OS (Linux & Windows native binaries)
Multi-Platform (OpenCL & CUDA support)
Multi-Algo (see below)
Low resource utilization, you can still watch movies or play games while cracking
Focuses highly iterated, modern hashes
Focuses single dictionary based attacks
Supports pause / resume while cracking
Supports reading words from file
Supports reading words from stdin
Integrated thermal watchdog
20+ Algorithms implemented with performance in mind
If you have any question, leave a note.
__________
http://maurisdump.blogspot.com/