You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Currently wifite tries all selected targets in-order, trying WPS pixie-dust, then the PIN attack, then WPA handshake capture.
Ideally the script would:
Target closest APs first
Target WEP networks first
Target WPS networks with Pixie Dust
WPA: Capture handshake, try small/medium sized word lists
Try WPS PIN attack
This way the most-vulnerablr targets are attacked first.
Ideally we would run multiple attacks against targets on the same channel/frequency, but this might screw up some things (eg deauthing multiple clients at the same time, reaver getting confused, etc).
The text was updated successfully, but these errors were encountered:
Currently wifite tries all selected targets in-order, trying WPS pixie-dust, then the PIN attack, then WPA handshake capture.
Ideally the script would:
This way the most-vulnerablr targets are attacked first.
Ideally we would run multiple attacks against targets on the same channel/frequency, but this might screw up some things (eg deauthing multiple clients at the same time, reaver getting confused, etc).
The text was updated successfully, but these errors were encountered: