wifite - wep/wpa cracker for backtrack4

*this project is available in French: all thanks goto Matt² for his excellent translation!
*sorts targets by power (in dB); cracks closest access points first
*automatically deauths clients of hidden networks to decloak SSIDs
*numerous filters to specify exactly what to assault (wep/wpa/both, above positive signal strengths, channels, etc)
*customizable settings (timeouts, packets/sec, channel, modify mac address, ignore fake-auth, etc)
*"anonymous" feature; changes MAC to a random address before attacking, then changes back when assaults are complete
*all WPA handshakes are backed up to wifite.py's current listing
*smart WPA deauthentication -- cycles between all clients and broadcast deauths
*stop any assault with Ctrl+C -- options: continue, move onto next target, skip to cracking, or exit
*switching WEP assault methods does not reset IVs
*intel 4965 chipset fake-authentication support; makes use of wpa_supplicant workaround
*SKA support (untested)
*displays session summary at exit; shows any cracked keys
*all passwords saved to log.txt
*built-in updater: ./wifite.py -upgrade

Installation Instructions:
(Only works on Backtrack 4)

Download: wifite - wep/wpa cracker for backtrack4

Source: http://code.google.com/p/wifite/

hash krackin rss feed Subscribe in a reader

Copyright 2011 | All software listed is freeware unless otherwise stated. All software listed is property of the publisher. The software on this website may be reported by antivirus as malicious, however this can be disregarded due to the nature of these tools. Hash Krackin can not be held responsible for any of your actions performed by the resources of this website. Please contact the webmaster of any broken links or password cracker resources you would like featured on this site.