-
```
[!] Error: [Errno 2] No such file or directory
[!] Full stack trace below
[!] Traceback (most recent call last):
[!] File "./Wifite.py", line 201, in
[!] w.main()
[!] …
-
Hi,
Seems like I have to reopen this issue. I am using the new R87 wifite and wash 1.6.4.
When scanning for targets, all APs says no WPS even though I know most of them has (including mine to pl…
-
Small systems running OpenWRT and others don't have access to tshark, but they can use tcpdump.
So i would request that using tcpdump, and wash instead became an option.
-
Noticed when dockerizing a few tools that WiFite2 would show new clients (which I confirmed with wireshark did include a handshake) but wouldn't then move onto the next stage, just sat at "WPA Handhsh…
-
Hello everyone !
Hope you're doing well
I'm using the latest Kali version on USB live
And I was learning and working around with wifi pentesting to test my home network for vulnerabilities and f…
-
Mentioned in #52
I think Bully can find the PSK when force-fed the correct PIN (via `--bruteforce` and `-p`?). There's also a method using `wpa_supplicant` if I'm wrong about Bully.
-
Hello,
I am a kali linux 2017.2 user with an RT2800USB. For eg.
`VODAFONE_WIFI_108 (70:2E:22:87:86:10 @ 24db) WPS Pixie-Dust: Trying PIN:87790405 (Timeout) (runtime:1m7s tries:0 failures:98 lockouts…
ghost updated
6 years ago
-
when using the "aircrack-ng" method with dict "/usr/share/wordlists/fern-wifi/common.txt" wifite2 doesn't load the dict properly and the output will become
` [!] Failed to crack handshake: common.t…
-
We are trying to port this tool to pentoo in https://github.com/pentoo/pentoo-overlay/issues/354 but I realised after quick look that it will be a nightmare.
The current "official" way (https://git…
-
A bug appeared when i provided the actual password into the "common.txt" (for testing), this happens:
* NOTE: Most important information remains hidden for obvious reasons.. like AP name/MAC and pass…