Open wifiuk opened 7 years ago
tl;dr yes soon
In Wifite V1, the behavior is to completely ignore access points that have been cracked or handshake captured. To re-attack an access point, the user has to specify --recrack
. Not specifying --recrack
will actually hide access points from the target list (ugh).
I personally hate this feature since I'm testing and re-cracking the same access point over and over :(
BUT Wifite V1's behavior fits the narrative of a "set it and forget it" script. E.g. users run Wifite and target all
access points, and the script only does what's needed -- not redundantly attacking the same target.
I don't think hiding the AP totally is great. Thanks for all the work so far. This is my go to tool for WiFi work
Alright so to outline what needs to be done:
[!]
warning when attacking an AP we already cracked/captured.--dont-skip
?) or manually editing cracked.txt
--crack
option to attempt to crack an already-captured handshake.What's the current status of this feature? Also would be nice to add cracked wpa passwords from hashcat and skip those networks in future.
a friendly bump. is this still being worked on? what can i do to help finish this feature?
I seem to remember that there was an option to skip handshake capture in wifite if you had captured it before?
Can this be implemented in wifite2?