Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Better heuristic to attack targets more efficiently #26

Open
derv82 opened this issue May 31, 2017 · 2 comments
Open

Better heuristic to attack targets more efficiently #26

derv82 opened this issue May 31, 2017 · 2 comments

Comments

@derv82
Copy link
Owner

derv82 commented May 31, 2017

Currently wifite tries all selected targets in-order, trying WPS pixie-dust, then the PIN attack, then WPA handshake capture.

Ideally the script would:

  1. Target closest APs first
  2. Target WEP networks first
  3. Target WPS networks with Pixie Dust
  4. WPA: Capture handshake, try small/medium sized word lists
  5. Try WPS PIN attack

This way the most-vulnerablr targets are attacked first.

Ideally we would run multiple attacks against targets on the same channel/frequency, but this might screw up some things (eg deauthing multiple clients at the same time, reaver getting confused, etc).

@benbuschmannBSP
Copy link

a simple first step might be to only show targets with clients, I would appreciate a flag like that

@derv82
Copy link
Owner Author

derv82 commented Apr 6, 2018

a simple first step might be to only show targets with clients, I would appreciate a flag like that

Thanks for creating #79 to track this.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants