Subscribe by RSS RSS Icon
Follow me on Twitter Twitter Icon

Wifite - WiFi WEP/WPA Key Cracking Tool

Wifite has been designed specially for the Backtrack4 RC1 distribution of Ubuntu. It helps you to attack multiple WEP and WPA encrypted networks at the same time. This tool is customizable and can be automated with only a few arguments. This is a Python script can be trusted to run without supervision.


  • sorts targets by power (in dB); cracks closest access points first
  • all WPA handshakes are backed up (to’s working directory)
  • mid-attack options: stop during attack with Ctrl+C to use (continue, move onto next target, skip to cracking, exit)
  • numerous filters to specify exactly what to attack (wep/wpa/both, above certain signal strengths, channels, etc)
  • very customizable settings (timeouts, packets/sec, etc)
  • SKA support (untested)
  • finds devices in monitor mode; if none are found, prompts for selection
  • all passwords saved to log.txt
  • switching WEP attacks does not reset IVS
  • displays session summary at exit; shows any cracked keys
GUI mode (default)
Console mode

The tool can be run using the following commands:

Crack all WEP access points:
./ -all -nowpa

Crack all WEP access points with signal strength greater than (or equal to) 50dB:
./ -p 50 -nowpa

Attack all access points, use 'darkc0de.lst' for cracking WPA handshakes:
./ -all --dict /pentest/passwords/wordlists/darkc0de.lst

Attack all WPA access points, but do not try to crack -- any captured handshakes are saved automatically:
./ -all -nowpa --dict none

Crack all WEP access points greater than 50dB in strength, giving 15 minutes for each WEP attack method, and send packets at 600 packets/sec:
./ --power 50 -wepw 15 -pps 600

Attempt to crack WEP-encrypted access point "2WIRE752" endlessly -- program will not stop until key is cracked or user interrrupts with ^C):
./ -e "2WIRE752" -wepw 0

 You can download wifite here:


Copyright Info.

Only for my personal reference. I do not own any of these materials here. Use it at your own risk!

XHTML/CSS validations
Valid XHTML 1.0 Transitional Valid CSS!