Wifite and raspberry

Wifite and raspberry

Wifite and raspberry

7 Comments on Wifite and raspberry

Being quite a while since I have done a new blog post, been really busy with the project but had a lot of errors, and they just kept on piling up. I decided only do document what worked, rather than write about a bunch of stuff that didn’t work.  Being able to sniff networks and inject packages into them now, my journey into the wireless is almost complete for now. Been playing around with Wifite and raspberry a lot lately,  and I’ve come to love it a bit.

Wifite is a big script written in python, its goal is to automate the act of cracking wireless access points to the point where there will not be a need for a user to input commands. This is exactly what I needed in order to continue my work, so i downloaded it with a wget

wget https://raw.github.com/derv82/wifite/master/wifite.py

chmod +x wifite.py

these two will download the script and place it in the current folder you where in when the command was executed. The chmod needed to execute the script itself, it just tells the file system that this file my be run as a program.  Now that the script is downloaded and made execuatble, we need to start it.

./wifite.py

You should now be greeted by a welcome screen and some information about what is going on.

 wifite startscreen

It will put your wireless device into monitor mode (promiscuous mode). This courses the NIC to send all signals to the CPU rather than only the intended signals. This lets us catch “unintended packages” and makes us able to crack networks.

 

A bit of theory

I wanted to try out cracking the WEP networks first, this is the oldest and worst encryption you can put on your network. Some theory might be needed for this to make sense.  When you are using WEP, almost all your packages are sent with a 3 byte long vector called Initalization Vector. Inside almost all package sent by the netowrk, your will find these IV numbers. The IV’s are based on the pre-shared key that all associated/authenticated clients know. Knowing this helps us understand whats going on when write shows us this :

cracking asus wep arp-replay

 

Pay attention to the last message “deauthing to generate packets”. A more active WEP network means that more packages are sent which in turn means that we are able to get IV’s faster. This is good since the more IV’s we have, the better the chance to crack a WEP encryption. Doing a deauthing means to kick off asoiated wireless clients off the network. I use tool void11 for example, it forces all the clients to deauthenticate from the network, when the wireless client notices that the connection is lost, it will try to reassociate with the network. This helps us cracking the WEP encryption, since the act of reassociate with the network menas more packages for us, which means more IV’s to crack.

Martin Jørgensen

Martin Jørgensen

Got my degree from EAL in 2012 as an IT-Technologist with specialty in network. I enjoy living in a century where I can earn a living doing my hobby. Material I publish here are often part of my small projects.
Martin Jørgensen

Latest posts by Martin Jørgensen (see all)

Related Posts

  • Pingback: Automate wifi hacking using the Raspberry Pi recap » IT Technologist()

  • Le O

    Doesn’t work for me…
    It keeps saying “enabling monitor mode on wlan0… done”.

  • Lolguy Ren

    Im working on another approach. I put my raspberry in a router Dlink dir 300 case , il change that in the future because the battery only last like 5 hours between charges , along with a alfa awus036h , a tplink wn 722 wifi, a fm transmitter, and a web camera (without cases). I modified wifite, for automatically to hack a wep, then wpa /wpa2password automatically. i also modified a script to auto connect to a free wifi, with the alfa, and use the tp link wn 722 as an ap. it is also a media player, all controlled, have a ssd ( msata with usb adapter, that is powered only when i use it as a torrent box, a ftp player, media player and samba box because of 1 amp draw ). it will be fully controlled from buttons and with rgb leds for status). not yet ready, because not all scripts are finished. It is a perfect “hack box“. It will also be controlled by my android phone, and in the future im thinking of a phone/gps/3j jammer inside, controlled by the pi).

    • Sounds like you got your hands full. I would love to read more about it, happen to have a blog you post information on as well ?

      • Lolguy Ren

        unfortunately not, i dont have time for maintaining a blog. I have another part time job to make a glass covered swimming pool with rgb lights. but i promise i will post the scripts and pi image when im done with it. Loren

  • Asher Parry

    Sorry if you think this is off topic/not where to ask but I could not find answers elswhere, so I installed wifite completely and it worked but then I tried to install reaver-was (it said to install it in wifite) and when i got to the bit where you do ./configure
    It returned
    Bash: ./configure: Permission denied
    I really like your tutorial, please help
    Sincerely Asher Parry

    • Hallo Asher! 🙂 As long as we are talkinga bout IT/Linux stuff, I woudnt say that we could go off-topic.
      Since its been quite a while since I made this, I cant really remember what I did, but have you made sure that you are in root mode ? Try write “sudo” before executing the command.

Back to Top