Cheatography
https://cheatography.com
Wifite v2 is a Linux only tool for wireless network packet capture, and cracking, in an all-in-one automated tool.
This is a draft cheat sheet. It is a work in progress and is not finished yet.
Settings
Verbose output |
-v | --verbose |
shows additional output |
interface selection |
-i [interface name] |
selects the interface to useaffic |
channel selection |
-c [channel number(s)] |
input channel numbers you would like scanned. can be single or range or combination eg. 1,4-8 |
infinite attack |
-inf, --infinite |
random MAC |
-mac, --random-mac [ma:ca:dd:re:ss] |
randomizes mac address for attacking machine |
attack all targets timer: Pillage |
-p [time in seconds] |
attack all targets after a specified scan time in seconds |
kill conflicting processes |
--kill |
kill any processes interfering with monitor mode |
attack based on signal strength |
-pow, --power [power_level] |
attack any access points with at least "X" power |
skip password cracking, capture only |
--skip-crack |
don't attempt to crack handshakes that are captured |
number of targets to attack |
-first [number of targets] |
attacks only a specified number of targets |
ignore prior targets |
-ic, --ignore-cracked |
hide targets that were previously attacked |
show targets with clients only |
-clients-only |
only attack targets with clients connected to them for handshakes |
do not deauthenticate targets |
--nodeauths |
do not deauthenticate any targets, passive collection of handshakes only |
return interface to managed mode |
--daemon |
exit monitor mode and return to managed mode |
|
|
Filters
show only WEP networks |
--wep |
show only WPA networks |
--wpa |
show networks with WPS enabled |
--wps |
focus attacks to WPS only |
--wps-only |
don't use PMKID capture |
--no-pmkid |
Misc switches
retain the IVS files and reuse when cracking passowrd |
--keep-ivs |
specify dictionary file |
--dict [file] |
use bully program for WPS pin cracking |
--bully |
use reaver for WPS password cracking |
--reaver |
keep going if AP locks from WPS attack |
--ignore-locks |
show previously cracked access points |
--cracked |
check a .CAP file for captured handshakes |
--check [file-path] |
|
|
|