Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Equal (=) alignment #66

Open
wants to merge 21 commits into
base: master
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
153 changes: 153 additions & 0 deletions deps.sh
Original file line number Diff line number Diff line change
@@ -0,0 +1,153 @@
#!/bin/bash

# @author : Eduardo Novella
# 2015-11-13


# TODO
# pyrit has not been tested

APTCMD="apt-get"
APT_CANDIDATES="wget tshark gzip bzip2 tar p7zip p7zip-full"
DEPS_PYRIT="python2.7-dev python2.7-libpcap subversion libpcap-dev nvidia-cuda-toolkit \
linux-headers-$(uname -r) python-dev libssl-dev libpcap-dev zlib1g-dev cmake libboost1.54"
DEPS_AIRCRACK="build-essential libssl-dev pkg-config subversion libsqlite3-dev libpcap-dev sqlite3 libsqlite3-dev make gcc"
DEPS_REAVER_PIXIE="git libssl-dev"

VIOLET="\e[01;35m"
BLUE="\e[01;34m"
YELLOW="\e[01;33m"
RED="\e[01;31m"
GREEN="\e[01;32m"
END="\e[00m"


# Check for root privileges
if [ $UID -eq 0 ]
then
SUDO=""
else
SUDO="sudo"
fi


# Check if number of arguments introduced is one
if [ "$#" -ne 1 ]
then
echo -e "\nUsage: bash $0 AMD"
echo -e " bash $0 CUDA\n"
echo -e "AMD is your hashcat choice for AMD GPUs"
echo -e "CUDA is your hashcat choice for CUDA GPUs\n"
exit
fi

# Functions to install programs
function install_hashcat()
{

cd ~
if [ "AMD" == "$1" ]; then
prefix="ocl"
elif [ "CUDA" == "$1" ]; then
prefix="cuda"
else
exit
fi

wget https://hashcat.net/files/${prefix}Hashcat-1.37.7z
7z x ${prefix}Hashcat-1.37.7z
echo -e "\n[+] Your $RED HASHCAT_PATH $END to add in wifite.py is $GREEN $PWD/${prefix}Hashcat-1.37 $END\n"
rm ${prefix}Hashcat-1.37.7z 2>/dev/null

}


function install_cowpatty
{
cd /tmp
wget http://www.willhackforsushi.com/code/cowpatty/4.6/cowpatty-4.6.tgz
tar zxfv /tmp/cowpatty-4.6.tgz
cd /tmp/cowpatty-4.6
$SUDO make clean 2>/dev/null
make -j
$SUDO make install
rm -rf /tmp/cowpatty*
}



# function install_pyrit
# {
# $SUDO $APTCMD install $DEPS_PYRIT -y

# if [ "AMD" == "$1" ]; then
# prefix="opencl"
# elif [ "CUDA" == "$1" ]; then
# prefix="cuda"
# else
# exit
# fi

# cd /tmp
# wget https://pyrit.googlecode.com/files/cpyrit-${prefix}-0.4.0.tar.gz
# tar xvzf cpyrit-${prefix}-0.4.0.tar.gz
# cd cpyrit-${prefix}-0.4.0/
# $SUDO python setup.py install

# $SUDO rm -rf cpyrit*
# }

function install_pyrit
{
$SUDO $APTCMD install pyrit -y
}

function install_aircrack-ng-svn
{
$SUDO $APTCMD install $DEPS_AIRCRACK -y

cd /tmp
svn co http://svn.aircrack-ng.org/trunk/ aircrack-ng
cd aircrack-ng
make pcre=true sqlite=true -j2
$SUDO make pcre=true sqlite=true install
$SUDO airodump-ng-oui-update &

rm -rf /tmp/aircrack*
}


function install_reaver-pixie
{
$SUDO $APTCMD install $DEPS_REAVER_PIXIE -y

cd /tmp
git clone https://github.com/wiire/pixiewps.git
cd pixiewps/src
make -j
$SUDO make install

cd /tmp
git clone https://github.com/t6x/reaver-wps-fork-t6x
cd reaver-wps-fork-t6x/src
./configure
make -j2
$SUDO make install

rm -rf /tmp/pixiewps /tmp/reaver-wps-fork-t6x
}




# MAIN
$SUDO $APTCMD update
$SUDO $APTCMD install $APT_CANDIDATES -y

install_cowpatty
install_pyrit
install_aircrack-ng-svn
install_reaver-pixie
install_hashcat $1


47 changes: 38 additions & 9 deletions readme.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,31 +7,45 @@ An automated wireless attack tool.
What's New?
-----------

The biggest change from version 1 is support for ["reaver"](http://reaver-wps.googlecode.com/), a Wifi-Protected Setup (WPS) attack tool. Reaver can compromise the PIN and PSK for many routers that have WPS enabled, usually within hours.
The biggest change from version 1 is support for the tool [reaver](http://reaver-wps.googlecode.com/), a Wifi-Protected Setup (WPS) attack tool. Reaver can compromise the PIN and PSK for many routers that have WPS enabled, usually within hours. The tool pixiewps is also included and the script is up-to-date supporting the Pixie dust attack.

Another big change is the support for [hashcat](https://hashcat.net). Now Wifite can perform WPA cracking with multiGPUs at the same time.

Other changes include a complete code re-write with bug fixes and added stability. Due to problems with the Python Tkinter suite, the GUI has been left out of this latest version.


About
-----

_Wifite is for Linux only._
_Wifite is only for Linux._

Wifite was designed for use with pentesting distributions of Linux, such as [Kali Linux](http://www.kali.org/), [Pentoo](http://www.pentoo.ch/), [BackBox](http://www.backbox.org); any Linux distributions with wireless drivers patched for injection. The script appears to also operate with Ubuntu 11/10, Debian 6, and Fedora 16.
Wifite was designed for use with pentesting distributions of Linux, such as [Kali Linux](http://www.kali.org/), [Pentoo](http://www.pentoo.ch/), [BackBox](http://www.backbox.org); any Linux distributions with wireless drivers patched for injection. The script appears to also operate with Ubuntu 14.04/15.04, Debian 8 and Fedora 16.

Wifite must be run as __root__. This is required by the suite of programs it uses. Running downloaded scripts as root is a bad idea. I recommend using the Kali Linux bootable Live CD, a bootable USB stick (for persistent), or a virtual machine. Note that Virtual Machines cannot directly access hardware so a wireless USB dongle would be required.

Wifite assumes that you have a wireless card and the appropriate drivers that are patched for injection and promiscuous/monitor mode.



Dependencies
------------

In order to install all the prerequisites execute the following script. This script is for debian-based Linux distributions.

```{r, engine='bash'}
bash deps.sh
bash deps.sh [CUDA or AMD]
```
Execution
---------

To download and execute wifite, run the commands below:

`wget https://raw.github.com/derv82/wifite/master/wifite.py`
`chmod +x wifite.py`
`./wifite.py`
```sh
git clone https://github.com/enovella/wifite.git
chmod +x wifite.py
sudo python wifite.py
```


Required Programs
Expand All @@ -55,11 +69,14 @@ Please see [the installation guide](https://github.com/derv82/wifite/wiki/Instal
Suggested Programs
------------------

_`*` indicates program is not included in [Backtrack 5 R1](http://www.backtrack-linux.org/)_
* [__reaver__](http://code.google.com/p/reaver-wps/), a Wifi-Protected Setup (WPS) attack tool. Reaver includes a scanner "walsh" (or "wash") for detecting WPS-enabled access points. Wifite uses Reaver to scan for and attack WPS-enabled routers.

* `*`[__reaver__](http://code.google.com/p/reaver-wps/), a Wifi-Protected Setup (WPS) attack tool. Reaver includes a scanner "walsh" (or "wash") for detecting WPS-enabled access points. Wifite uses Reaver to scan for and attack WPS-enabled routers.
* [__hashcat__](https://hashcat.net), the best and fastest WPA PSK key MultiGPU cracker. Worlds fastest password cracker. It can be run as follows:
```
python wifite.py --aircrack --hashcat-gpu --dic /wordlists/rockyou.txt
```

* `*`[__pyrit__](http://code.google.com/p/pyrit/), a GPU cracker for WPA PSK keys. Wifite uses pyrit (if found) to detect handshakes. In the future, Wifite may include an option to crack WPA handshakes via pyrit.
* [__pyrit__](http://code.google.com/p/pyrit/), a GPU cracker for WPA PSK keys. Wifite uses pyrit (if found) to detect handshakes. In the future, Wifite may include an option to crack WPA handshakes via pyrit.

* __tshark__. Comes bundled with [Wireshark](http://www.wireshark.org/), packet sniffing software.

Expand All @@ -71,4 +88,16 @@ Licensing

Wifite is licensed under the GNU General Public License version 2 (GNU GPL v2).

```
(C) 2010-2012 Derv Merkler
```

```

(C) 2014-2015 [email protected] --> bwall @botnet_hunter && drone @dronesec
g0tmi1k && invisibleroads && intech && hatRiot
```

```
(C) 2015-2016 Eduardo Novella (@enovella_)
```
Loading