Skip to content

Commit da84acc

Browse files
committed
Update README.md
1 parent 95fd40c commit da84acc

1 file changed

Lines changed: 178 additions & 0 deletions

File tree

README.md

Lines changed: 178 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -591,6 +591,184 @@ A: First, verify the attacks are unauthorized. If confirmed malicious, document
591591
**Q: Can attackers detect that I'm monitoring?**
592592
A: No, passive monitoring is undetectable. Your wireless adapter only receives frames without transmitting anything.
593593

594+
### WPA-SEC Online Cracking Integration
595+
596+
Wifite integrates with [wpa-sec.stanev.org](https://wpa-sec.stanev.org), a free online WPA/WPA2/WPA3 password cracking service. Upload your captured handshakes and PMKIDs to leverage distributed computing resources for cracking.
597+
598+
#### Why Use WPA-SEC?
599+
600+
* **Distributed Cracking** - Leverage massive wordlists and computing power
601+
* **Free Service** - No cost for basic usage
602+
* **Multiple Hash Types** - Supports WPA/WPA2 handshakes, PMKIDs, and WPA3-SAE
603+
* **Email Notifications** - Get notified when passwords are cracked
604+
* **Complementary** - Works alongside local cracking attempts
605+
606+
#### Quick Start
607+
608+
```bash
609+
# Enable wpa-sec uploads with your API key
610+
sudo wifite --wpasec --wpasec-key YOUR_API_KEY
611+
612+
# Automatic upload mode (no prompts)
613+
sudo wifite --wpasec --wpasec-key YOUR_API_KEY --wpasec-auto
614+
615+
# Upload with email notifications
616+
sudo wifite --wpasec --wpasec-key YOUR_API_KEY --wpasec-email your@email.com
617+
618+
# Remove capture files after successful upload
619+
sudo wifite --wpasec --wpasec-key YOUR_API_KEY --wpasec-auto --wpasec-remove
620+
```
621+
622+
#### Getting Your API Key
623+
624+
1. Visit [wpa-sec.stanev.org](https://wpa-sec.stanev.org)
625+
2. Click "Get your key" or navigate to the API section
626+
3. Follow the registration process to receive your unique API key
627+
4. Keep your API key secure - it identifies your submissions
628+
629+
#### Upload Modes
630+
631+
**Interactive Mode (Default)**
632+
```bash
633+
sudo wifite --wpasec --wpasec-key YOUR_API_KEY
634+
```
635+
* Prompts you after each successful capture
636+
* Choose which handshakes to upload
637+
* Full control over what gets submitted
638+
639+
**Automatic Mode**
640+
```bash
641+
sudo wifite --wpasec --wpasec-key YOUR_API_KEY --wpasec-auto
642+
```
643+
* Uploads all captures automatically
644+
* No prompts or interruptions
645+
* Best for unattended operations
646+
647+
#### Command-Line Options
648+
649+
| Option | Description | Example |
650+
|--------|-------------|---------|
651+
| `--wpasec` | Enable wpa-sec upload functionality | `--wpasec` |
652+
| `--wpasec-key [key]` | Your wpa-sec.stanev.org API key | `--wpasec-key abc123...` |
653+
| `--wpasec-auto` | Automatically upload without prompting | `--wpasec-auto` |
654+
| `--wpasec-url [url]` | Custom wpa-sec server URL | `--wpasec-url https://custom.server` |
655+
| `--wpasec-timeout [sec]` | Connection timeout in seconds (default: 30) | `--wpasec-timeout 60` |
656+
| `--wpasec-email [email]` | Email address for notifications | `--wpasec-email you@example.com` |
657+
| `--wpasec-remove` | Delete capture files after successful upload | `--wpasec-remove` |
658+
659+
#### Supported Capture Types
660+
661+
Wifite can upload all types of WPA/WPA2/WPA3 captures to wpa-sec:
662+
663+
* **WPA/WPA2 Handshakes** - Traditional 4-way handshake captures (.cap, .pcap, .pcapng)
664+
* **PMKID Captures** - Clientless WPA2 attack captures (.pcapng format from hcxdumptool)
665+
* **WPA3-SAE Handshakes** - WPA3 authentication captures (.pcapng)
666+
* **Compressed Files** - Gzip-compressed captures (.gz)
667+
668+
**Note:** wpa-sec only accepts pcap/pcapng packet capture formats. Hash files (.22000) are not supported for upload.
669+
670+
#### Usage Examples
671+
672+
**Basic WPA attack with upload:**
673+
```bash
674+
sudo wifite --wpa --wpasec --wpasec-key YOUR_API_KEY
675+
```
676+
677+
**PMKID attack with automatic upload:**
678+
```bash
679+
sudo wifite --pmkid --wpasec --wpasec-key YOUR_API_KEY --wpasec-auto
680+
```
681+
682+
**WPA3 attack with email notifications:**
683+
```bash
684+
sudo wifite --wpa3-only --wpasec --wpasec-key YOUR_API_KEY --wpasec-email you@example.com
685+
```
686+
687+
**Target specific network and upload:**
688+
```bash
689+
sudo wifite -b AA:BB:CC:DD:EE:FF --wpasec --wpasec-key YOUR_API_KEY
690+
```
691+
692+
**Dual interface mode with automatic upload:**
693+
```bash
694+
sudo wifite --dual-interface --wpasec --wpasec-key YOUR_API_KEY --wpasec-auto
695+
```
696+
697+
#### Tool Requirements
698+
699+
WPA-SEC integration requires the `wlancap2wpasec` tool from the hcxtools suite:
700+
701+
```bash
702+
# Kali Linux / Debian / Ubuntu
703+
sudo apt update && sudo apt install hcxtools
704+
705+
# Arch Linux
706+
sudo pacman -S hcxtools
707+
708+
# Verify installation
709+
wlancap2wpasec --version
710+
```
711+
712+
**Note:** wlancap2wpasec is optional - wifite will work normally without it, but wpa-sec upload features will be unavailable.
713+
714+
#### Troubleshooting
715+
716+
**"wlancap2wpasec not found" error:**
717+
* Install hcxtools package: `sudo apt install hcxtools`
718+
* Verify installation: `which wlancap2wpasec`
719+
* Ensure hcxtools is in your PATH
720+
721+
**"Invalid API key" error:**
722+
* Verify your API key is correct (check wpa-sec.stanev.org)
723+
* Ensure there are no extra spaces or characters
724+
* API keys are case-sensitive
725+
726+
**"Upload failed: Connection timeout" error:**
727+
* Check your internet connection
728+
* Try increasing timeout: `--wpasec-timeout 60`
729+
* Verify wpa-sec.stanev.org is accessible from your network
730+
731+
**"No handshake in capture file" error:**
732+
* This is expected - wifite validates captures before upload
733+
* Only valid handshakes/PMKIDs are uploaded
734+
* Check capture quality with `tshark` or `aircrack-ng`
735+
736+
**Upload succeeds but file not removed:**
737+
* Ensure you used `--wpasec-remove` flag
738+
* Check file permissions in the capture directory
739+
* Files are only removed after confirmed successful upload
740+
741+
#### Privacy and Security Considerations
742+
743+
**What Gets Uploaded:**
744+
* Capture files containing handshakes/PMKIDs
745+
* Target network BSSID and ESSID
746+
* Your API key (for identification)
747+
748+
**What Does NOT Get Uploaded:**
749+
* Your location or IP address (beyond what's in HTTP headers)
750+
* Client device information
751+
* Cracked passwords (you retrieve these from wpa-sec)
752+
753+
**Best Practices:**
754+
* Only upload captures from authorized testing
755+
* Use `--wpasec-remove` to avoid leaving sensitive files on disk
756+
* Keep your API key secure - don't share it publicly
757+
* Be aware that uploaded data is processed by a third-party service
758+
* Review wpa-sec.stanev.org privacy policy and terms of service
759+
760+
**Legal Reminder:** Only upload captures from networks you own or have explicit written authorization to test. Uploading captures from unauthorized networks may be illegal in your jurisdiction.
761+
762+
#### Checking Results
763+
764+
After uploading, visit [wpa-sec.stanev.org](https://wpa-sec.stanev.org) to:
765+
* View your submission history
766+
* Check cracking progress
767+
* Download cracked passwords
768+
* Manage your API key and settings
769+
770+
If you provided an email address with `--wpasec-email`, you'll receive notifications when passwords are successfully cracked.
771+
594772
### Resume Feature
595773

596774
Wifite automatically saves your attack progress and allows you to resume interrupted sessions:

0 commit comments

Comments
 (0)