Wifite automates wireless network security testing and identifying vulnerabilities. Fast and intuitive, ideal for network administrators and security professionals.

Wifite is a powerful security tool designed to test and secure wireless networks. It is a Python-based wireless auditing tool that enables security professionals and network administrators to automate the process of testing wireless network security, identify vulnerabilities and flaws, and enhance network security.

Wifite is designed to work with a variety of wireless network cards, and it supports both the 2.4GHz and 5GHz frequency bands. This flexibility ensures that network administrators can use the tool to test the security of a wide range of wireless networks, including those using the latest standards.

The tool is designed to make the wireless network auditing process as easy and straightforward as possible. With a simple and intuitive command-line interface, it enables users to configure and customize the testing process based on their specific needs. Wifite also supports a range of attack modes, including WPA, WEP, WPS, and WPA2, giving users the flexibility to test different aspects of wireless network security.

Wifite’s automated process allows it to crack WPA and WPA2 encrypted networks with a high success rate. Its ability to capture and decrypt wireless network traffic is one of its key features, making it an essential tool for detecting security flaws and vulnerabilities in wireless networks.

One of the biggest advantages of Wifite is that it is incredibly fast, thanks to its automated process. This means that network administrators and security professionals can perform thorough wireless network audits in a fraction of the time it would take to do so manually. The tool also allows for easy customization of the testing process, so users can choose which tests they want to perform, and how they want to perform them.

Overall, Wifite is an essential tool for network administrators and security professionals looking to test and secure wireless networks. Its easy-to-use interface, extensive feature set, and lightning-fast performance make it an ideal choice for anyone looking to enhance the security of their wireless networks.

wifite Usage Example

Attack access points with over 50 dB of power (-pow 50) using the WPS attack (-wps):

:~# wifite -pow 50 -wps

  .;'                     `;,
 .;'  ,;'             `;,  `;,   WiFite v2 (r85)
.;'  ,;'  ,;'     `;,  `;,  `;,
::   ::   :   ( )   :   ::   ::  automated wireless auditor
':.  ':.  ':. /_\ ,:'  ,:'  ,:'
 ':.  ':.    /___\    ,:'  ,:'   designed for Linux
  ':.       /_____\      ,:'
           /       \

 [+] targeting WPS-enabled networks

 [+] scanning for wireless devices...
 [+] enabling monitor mode on wlan0... done
 [+] initializing scan (mon0), updates at 5 sec intervals, CTRL+C when ready.

Packages and Binaries:


Wifite is a tool to audit WEP or WPA encrypted wireless networks. It uses aircrack-ng, pyrit, reaver, tshark tools to perform the audit.

This tool is customizable to be automated with only a few arguments and can be trusted to run without supervision.

Installed size: 2.34 MB How to install: sudo apt install wifite

  • aircrack-ng

  • ieee-data

  • net-tools

  • python3

  • python3-chardet

  • reaver

  • tshark


Python script to automate wireless auditing using aircrack-ng tools

:~# wifite -h
   .               .    
 .Β΄  Β·  .     .  Β·  `.  wifite2 2.6.6
 :  :  :  (Β―)  :  :  :  a wireless auditor by derv82
 `.  Β·  ` /Β―\ Β΄  Β·  .Β΄  maintained by kimocoder
   `     /Β―Β―Β―\     Β΄    https://github.com/kimocoder/wifite2

  -h, --help                                 show this help message and exit

  -v, --verbose                              Shows more options (-h -v). Prints commands and outputs. (default:
  -i [interface]                             Wireless interface to use, e.g. wlan0mon (default: ask)
  -c [channel]                               Wireless channel to scan e.g. 1,3-6 (default: all 2Ghz channels)
  -inf, --infinite                           Enable infinite attack mode. Modify scanning time with -p (default:
  -mac, --random-mac                         Randomize wireless card MAC address (default: off)
  -p [scan_time]                             Pillage: Attack all targets after scan_time (seconds)
  --kill                                     Kill processes that conflict with Airmon/Airodump (default: off)
  -pow [min_power], --power [min_power]      Attacks any targets with at least min_power signal strength
  --skip-crack                               Skip cracking captured handshakes/pmkid (default: off)
  -first [attack_max], --first [attack_max]  Attacks the first attack_max targets
  -ic, --ignore-cracked                      Hides previously-cracked targets. (default: off)
  --clients-only                             Only show targets that have associated clients (default: off)
  --nodeauths                                Passive mode: Never deauthenticates clients (default: deauth targets)
  --daemon                                   Puts device back in managed mode after quitting (default: off)

  --wep                                      Show only WEP-encrypted networks
  --require-fakeauth                         Fails attacks if fake-auth fails (default: off)
  --keep-ivs                                 Retain .IVS files and reuse when cracking (default: off)

  --wpa                                      Show only WPA-encrypted networks (includes WPS)
  --new-hs                                   Captures new handshakes, ignores existing handshakes in hs (default:
  --dict [file]                              File containing passwords for cracking (default: /usr/share/dict/wordlist-

  --wps                                      Show only WPS-enabled networks
  --wps-only                                 Only use WPS PIN & Pixie-Dust attacks (default:
  --bully                                    Use bully program for WPS PIN & Pixie-Dust attacks (default:
  --reaver                                   Use reaver program for WPS PIN & Pixie-Dust attacks (default:
  --ignore-locks                             Do not stop WPS PIN attack if AP becomes locked (default:

  --pmkid                                    Only use PMKID capture, avoids other WPS & WPA attacks (default:
  --no-pmkid                                 Don't use PMKID capture (default: off)
  --pmkid-timeout [sec]                      Time to wait for PMKID capture (default: 300 seconds)

  --cracked                                  Print previously-cracked access points
  --check [file]                             Check a .cap file (or all hs/*.cap files) for WPA handshakes
  --crack                                    Show commands to crack a captured handshake

Updated on: 2022-Nov-16

Last updated