derv82 / wifite2

Rewrite of the popular wireless network auditor, "wifite"
GNU General Public License v2.0
6.31k stars 1.29k forks source link

continue cracking - captured before #22

Open wifiuk opened 7 years ago

wifiuk commented 7 years ago

I seem to remember that there was an option to skip handshake capture in wifite if you had captured it before?

Can this be implemented in wifite2?

derv82 commented 7 years ago

tl;dr yes soon

In Wifite V1, the behavior is to completely ignore access points that have been cracked or handshake captured. To re-attack an access point, the user has to specify --recrack. Not specifying --recrack will actually hide access points from the target list (ugh).

I personally hate this feature since I'm testing and re-cracking the same access point over and over :(

BUT Wifite V1's behavior fits the narrative of a "set it and forget it" script. E.g. users run Wifite and target all access points, and the script only does what's needed -- not redundantly attacking the same target.

wifiuk commented 7 years ago

I don't think hiding the AP totally is great. Thanks for all the work so far. This is my go to tool for WiFi work

derv82 commented 7 years ago

Alright so to outline what needs to be done:

  1. Still show cracked targets in the AP list
  2. Show a [!] warning when attacking an AP we already cracked/captured.
  3. WEP, WPS (pixie-dust & reaver), and WPA Handshake capture are skipped if we already have a handshake.
  4. Tell user how to bypass this, using an option (--dont-skip?) or manually editing cracked.txt
  5. If it's a handshake but the key is unknown, tell user to use the --crack option to attempt to crack an already-captured handshake.
evrial commented 5 years ago

What's the current status of this feature? Also would be nice to add cracked wpa passwords from hashcat and skip those networks in future.

rpodgorny commented 11 months ago

a friendly bump. is this still being worked on? what can i do to help finish this feature?