Provided by: wifite_2.7.0-1_all bug

NAME

       wifite - Python script to automate wireless auditing using aircrack-ng tools

SYNOPSIS

       wifite [SETTINGS] [FILTERS]

DESCRIPTION

       Wifite  is  a  tool to audit WEP or WPA encrypted wireless networks.  It uses aircrack-ng, pyrit, reaver,
       tshark tools to perform the audit.

       This tool is customizable to be automated with only a few arguments and can be  trusted  to  run  without
       supervision.

COMMANDS

         -check <file>  check capfile <file> for handshakes.
         -cracked       display previously-cracked access points

GLOBAL

         -all      attack all targets.              [off]
         -i <iface>     wireless interface for capturing [auto]
         -mac      Changes MAC address of 'iface' to a random MAC. [off]
         -c <channel>   channel to scan for targets      [auto]
         -e <essid>     target a specific access point by ssid (name)  [ask]
         -b <bssid>     target a specific access point by bssid (mac)  [auto]
         -showb    display target BSSIDs after scan               [off]
         -pow <db> attacks any targets with signal strenghth > db [0]
         -q -quiet do not print list of APs during scan           [off]

WPA

         -wpa      only target WPA networks (works with -wps -wep)   [off]
         -wpat <sec>    time to wait for WPA attack to complete (seconds) [500]
         -wpadt <sec>   time to wait between sending deauth packets (sec) [10]
         -strip    strip handshake using tshark or pyrit             [off]
         -crack <dic>   crack WPA handshakes using <dic> wordlist file    [off]
         -dict <file>   specify dictionary to use when cracking WPA [phpbb.txt]
         -aircrack verify handshake using aircrack [on]
         -pyrit    verify handshake using pyrit    [off]
         -tshark   verify handshake using tshark   [on]

WEP

         -wep      only target WEP networks [off]
         -pps <num>     set the number of packets per second to inject [600]
         -wept <sec>    sec to wait for each attack, 0 implies endless [600]
         -chopchop use chopchop attack      [on]
         -arpreplay     use arpreplay attack     [on]
         -fragment use fragmentation attack [on]
         -caffelatte    use caffe-latte attack   [on]
         -p0841    use -p0841 attack        [on]
         -hirte    use hirte (cfrag) attack [on]
         -nofakeauth    stop attack if fake authentication fails    [off]
         -wepca <n>     start cracking when number of ivs surpass n [10000]
         -wepsave  save a copy of .cap files to this directory [off]

WPS

         -wps                only target WPS networks         [off]
         -wpst -wpstime <sec>     max wait for new retry before giving up (0: never)  [660]
         -wpsratio -wpsr <per>    min ratio of successful PIN attempts/total tries    [0]
         -wpsretry -wpsmaxr <num> max number of retries for same PIN before giving up [0]

OTHERS COMMANDS

         -upgrade  Checks for new version
         -update   Checks for new version

EXAMPLES

         ./wifite.py -wps -wep -c 6 -pps 600

AUTHOR

       Dave M (derv82@gmail.com)

       This  manual  page was written by Daniel Echeverry <epsilon77@gmail.com>, for the Debian project (and may
       be used by others).

                                                   30/07/2012                                          WIFITE(1)