hi,
please can you tell me how i can edit this? I a beginner and fight for hours and hours to fix this problem. It seems you got the solution.
current wifite build doesn't capture handshakes properly. in wifite.py you have to change -R to -Y here (-R shows tips) :
Code:if program_exists('tshark'): # Call Tshark to return list of EAPOL packets in cap file. cmd = ['tshark', '-r', capfile, # Input file '-Y', 'eapol', # Filter (only EAPOL packets) '-n'] # Do not resolve names (MAC vendors)
hi,
please can you tell me how i can edit this? I a beginner and fight for hours and hours to fix this problem. It seems you got the solution.
havde you tried the new wifite? https://forums.kali.org/showthread.p...1637#post71637
I dont know if its working on on nethunter.
Im having problems with wifite in nethunter, loops back after enable monitor mode, but i can run it with wifite --mon-iface wlan1mon, but that dosnt work on the new wifite script. how do i add the --mon-iface command to the new wifite? Is it hard?
This works. Thank you. Before I configured my wifite it would just "pass through" the hand shake, but if I had airodump-ng running at the same time there was an obvious handshake there. Now wifite is recording these handshakes. Very good! This makes me wonder about the wps attack. Hmm!
Last edited by bigbiz; 2017-09-29 at 05:35. Reason: Add more info