debian/0000755000000000000000000000000012010343203007152 5ustar debian/README.Debian0000644000000000000000000000052012010314450011212 0ustar Wifite for Debian. ----------------------- Unfortunately, Cowpatty isn't included in official debian repositories, for that reason, you need to install Cowpatty if you want to use this tool to crack WPA networks. http://sourceforge.net/projects/cowpatty/ -- Daniel Echeverry Mon, 30 Jul 2012 20:56:13 -0500 debian/wifite.manpages0000644000000000000000000000002012005650310012152 0ustar debian/wifite.1 debian/watch0000644000000000000000000000012612010125634010210 0ustar version=3 http://code.google.com/p/wifite/downloads/list .*/files/wifite-(.*).tar.gz debian/changelog0000644000000000000000000000023412010126100011016 0ustar wifite (2.0r85-1) unstable; urgency=low * Initial release (Closes: #606417) -- Daniel Echeverry Mon, 30 Jul 2012 20:56:13 -0500 debian/control0000644000000000000000000000127012010323657010570 0ustar Source: wifite Section: net Priority: optional Maintainer: Daniel Echeverry Build-Depends: python (>= 2.6), debhelper (>= 9) X-Python-Version: >= 2.6 Standards-Version: 3.9.3 Homepage: http://code.google.com/p/wifite/ Package: wifite Architecture: all Depends: ${python:Depends}, ${misc:Depends}, aircrack-ng, reaver, pyrit, tshark Description: Python script to automate wireless auditing using aircrack-ng tools Wifite is a tool to audit WEP or WPA encrypted wireless networks. It uses aircrack-ng, pyrit, reaver, tshark tools to perform the audit. . This tool is customizable to be automated with only a few arguments and can be trusted to run without supervision. debian/copyright0000644000000000000000000000220512010316145011111 0ustar Format: http://www.debian.org/doc/packaging-manuals/copyright-format/1.0/ Upstream-Name: wifite Upstream-Contact: Derv Merkler Source: http://code.google.com/p/wifite/ Files: * Copyright: 2011-2012 Derv Merkler License: GPL-2.0 Files: debian/* Copyright: 2012 Daniel Echeverry License: GPL-2.0 License: GPL-2.0 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; version 2 of the License. . This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. . You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA . On Debian GNU/Linux systems, the complete text of the GNU General Public License can be found in `/usr/share/common-licenses/GPL-2'. debian/rules0000755000000000000000000000040312010341524010233 0ustar #!/usr/bin/make -f #export DH_VERBOSE=1 INSTALL := install -o root -g root -m 755 DESTDIRW := $(CURDIR)/debian/wifite/usr/bin %: dh $@ --with python2 override_dh_install: mkdir -p $(DESTDIRW) $(INSTALL) wifite.py $(CURDIR)/debian/wifite/usr/bin/wifite debian/source/0000755000000000000000000000000012005634551010467 5ustar debian/source/format0000644000000000000000000000001412005634551011675 0ustar 3.0 (quilt) debian/compat0000644000000000000000000000000212005635505010365 0ustar 9 debian/wifite.10000644000000000000000000000557312010342723010543 0ustar .TH "WIFITE" "1" "30/07/2012" .SH NAME wifite \- Python script to automate wireless auditing using aircrack-ng tools .SH SYNOPSIS wifite [SETTINGS] [FILTERS] .SH DESCRIPTION Wifite is a tool to audit WEP or WPA encrypted wireless networks. It uses aircrack-ng, pyrit, reaver, tshark tools to perform the audit. This tool is customizable to be automated with only a few arguments and can be trusted to run without supervision. .SH COMMANDS \-check check capfile for handshakes. \-cracked display previously\-cracked access points .SH GLOBAL \-all attack all targets. [off] \-i wireless interface for capturing [auto] \-mac Changes MAC address of 'iface' to a random MAC. [off] \-c channel to scan for targets [auto] \-e target a specific access point by ssid (name) [ask] \-b target a specific access point by bssid (mac) [auto] \-showb display target BSSIDs after scan [off] \-pow attacks any targets with signal strenghth > db [0] \-q \-quiet do not print list of APs during scan [off] .SH WPA \-wpa only target WPA networks (works with \-wps \-wep) [off] \-wpat time to wait for WPA attack to complete (seconds) [500] \-wpadt time to wait between sending deauth packets (sec) [10] \-strip strip handshake using tshark or pyrit [off] \-crack crack WPA handshakes using wordlist file [off] \-dict specify dictionary to use when cracking WPA [phpbb.txt] \-aircrack verify handshake using aircrack [on] \-pyrit verify handshake using pyrit [off] \-tshark verify handshake using tshark [on] .SH WEP \-wep only target WEP networks [off] \-pps set the number of packets per second to inject [600] \-wept sec to wait for each attack, 0 implies endless [600] \-chopchop use chopchop attack [on] \-arpreplay use arpreplay attack [on] \-fragment use fragmentation attack [on] \-caffelatte use caffe\-latte attack [on] \-p0841 use \-p0841 attack [on] \-hirte use hirte (cfrag) attack [on] \-nofakeauth stop attack if fake authentication fails [off] \-wepca start cracking when number of ivs surpass n [10000] \-wepsave save a copy of .cap files to this directory [off] .SH WPS \-wps only target WPS networks [off] \-wpst \-wpstime max wait for new retry before giving up (0: never) [660] \-wpsratio \-wpsr min ratio of successful PIN attempts/total tries [0] \-wpsretry \-wpsmaxr max number of retries for same PIN before giving up [0] .SH OTHERS COMMANDS \-upgrade Checks for new version \-update Checks for new version .SH EXAMPLES ./wifite.py \-wps \-wep \-c 6 \-pps 600 .SH AUTHOR Dave M (derv82@gmail.com) .PP This manual page was written by Daniel Echeverry , for the Debian project (and may be used by others).