Boms0 / wifite

Automatically exported from code.google.com/p/wifite
GNU General Public License v2.0
0 stars 0 forks source link

Increase # of deauthentification #60

Closed GoogleCodeExporter closed 9 years ago

GoogleCodeExporter commented 9 years ago
What steps will reproduce the problem?
1. The WPA attack never gets the handshake

What version of the product are you using? On what operating system?
last version (I downloaded yesterday using wget) - OS: Ubuntu, BT5

Please provide any additional information below.
Actually my question is how can I improve wifite performance? like increasing 
the number of deauth to get faster the handshake and the time to deauth the AP/ 
Client??? Is there any way to work with Rainbow tables? and last question, how 
do I integrate Pyrit? I downloaded Pyrit but dont know how to integrate it to 
Wifite

Thanks for any help that you could provide

Cocaui

Original issue reported on code.google.com by electroe...@gmail.com on 20 Sep 2011 at 1:26

GoogleCodeExporter commented 9 years ago
There is no way to speed up WPA handshake capture. You have to be listening 
when another machine connects to the network.  This can take a very long time.  
I should mention that you want to be as close to the router as possible since 
not all wireless cards behave the same.

By installing pyrit, wifite will try to use pyrit to strip handshakes 
automatically.

Wifite can also crack using pyrit, but you also need "cowpatty" installed to 
crack with pyrit. Cowpatty comes with BT5.

use the options --pyrit or -py to use pyrit + cowpatty to crack found WPA 
handshakes.

There's no way to work with rainbow tables at this time. You could simple use 
wifite to capture the handshake and then manually crack the .cap file without 
the use of a script.

Original comment by der...@gmail.com on 1 Feb 2012 at 9:47