Skip to content

Commit 6938303

Browse files
authored
Merge pull request #458 from kimocoder/claude/update-readme-accuracy-fFxTV
Fix README.md accuracy: correct version, CLI flags, and dead links
2 parents bf0ff90 + 402c3d7 commit 6938303

File tree

1 file changed

+16
-26
lines changed

1 file changed

+16
-26
lines changed

README.md

Lines changed: 16 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
[![GitHub version](https://img.shields.io/badge/version-2.9.9-informational.svg)](#)
1+
[![GitHub version](https://img.shields.io/badge/version-2.9.9--beta-informational.svg)](#)
22
[![GitHub issues](https://img.shields.io/github/issues/kimocoder/wifite2.svg)](https://github.com/kimocoder/wifite2/issues)
33
[![GitHub forks](https://img.shields.io/github/forks/kimocoder/wifite2.svg)](https://github.com/kimocoder/wifite2/network)
44
[![GitHub stars](https://img.shields.io/github/stars/kimocoder/wifite2.svg)](https://github.com/kimocoder/wifite2/stargazers)
@@ -23,8 +23,6 @@ Wifite is designed to use all known methods for retrieving the password of a wir
2323
5. WPA3: Transition mode downgrade attacks (force WPA2 on mixed networks).
2424
6. WEP: Various known attacks against WEP, including *fragmentation*, *chop-chop*, *aireplay*, etc.
2525
7. **Evil Twin**: Rogue AP attack with captive portal for credential capture.
26-
8. WIFI Signal jammer, block specific accesspoints or multiple.
27-
signal jamming only works for specific Atheros WiFi chipsets.
2826

2927
Run wifite, select your targets, and Wifite will automatically start trying to capture or crack the password.
3028

@@ -58,7 +56,7 @@ Supported Operating Systems
5856

5957
### Mobile Support 📱
6058
* **Kali NetHunter (Android)** - Requires custom kernel with monitor mode support
61-
* Tested on Android 10 to latest 16
59+
* Tested on Android 10 and newer
6260
* Requires compatible wireless adapter and proper drivers
6361
* See [NetHunter Documentation](https://www.kali.org/docs/nethunter/) for setup
6462

@@ -83,8 +81,7 @@ Second, only the latest versions of these programs are supported and must be ins
8381

8482
**Required:**
8583

86-
* Suggest using `python3` as `python2` was marked deprecated as of january 2020.
87-
* As we moved from older python and changed to fully support and run on `python3.14`
84+
* `python3` (Python 3.9+, tested up to Python 3.14)
8885
* [`Iw`](https://wireless.wiki.kernel.org/en/users/documentation/iw): For identifying wireless devices already in Monitor Mode.
8986
* [`Ip`](https://packages.debian.org/buster/net-tools): For starting/stopping wireless devices.
9087
* [`Aircrack-ng`](https://aircrack-ng.org/) suite, includes:
@@ -161,8 +158,6 @@ poetry shell
161158
sudo wifite
162159
```
163160

164-
**See [POETRY.md](POETRY.md) for detailed Poetry usage and commands.**
165-
166161
### Development Install with pip
167162

168163
For development or if you want to modify wifite:
@@ -238,7 +233,7 @@ Features
238233
* **Manual Control** - Specify primary and secondary interfaces manually
239234
* **Backward Compatible** - Seamlessly falls back to single interface mode
240235
* **📖 Complete Guide:** [Dual Interface Guide](docs/DUAL_INTERFACE_GUIDE.md)
241-
* **🔧 Troubleshooting:** [Dual Interface Troubleshooting](docs/DUAL_INTERFACE_TROUBLESHOOTING.md)
236+
242237
* **Wireless Attack Monitoring** - Passive detection and analysis of wireless attacks (use with: `--monitor-attacks`)
243238
* **Real-time Detection** - Identifies deauthentication and disassociation attacks as they occur
244239
* **Attack Statistics** - Tracks attack counts, targeted networks, and attacker devices
@@ -342,7 +337,7 @@ sudo apt update
342337
sudo apt install hcxdumptool hcxtools hashcat
343338
```
344339

345-
**📖 For detailed installation instructions, version requirements, and troubleshooting, see [WPA3 Tool Requirements Guide](docs/WPA3_TOOL_REQUIREMENTS.md)**
340+
**📖 For WPA3-specific troubleshooting, see [WPA3 Troubleshooting](docs/WPA3_TROUBLESHOOTING.md)**
346341

347342
#### Understanding WPA3 Network Types
348343

@@ -425,7 +420,7 @@ sudo wifite --monitor-attacks --monitor-hop
425420
sudo wifite --monitor-attacks --monitor-log /path/to/attack_log.txt
426421

427422
# Use classic text mode instead of TUI
428-
sudo wifite --monitor-attacks --classic
423+
sudo wifite --monitor-attacks --no-tui
429424
```
430425

431426
#### Understanding the TUI Display
@@ -523,7 +518,7 @@ sudo wifite --monitor-attacks --monitor-hop --monitor-log "attacks_$(date +%Y%m%
523518
sudo wifite --monitor-attacks --monitor-log /var/log/wifite/attacks_$(date +%Y%m%d).log
524519

525520
# Monitor specific channel in classic mode (no TUI, lower resource usage)
526-
sudo wifite --monitor-attacks --monitor-channel 1 --classic --monitor-log attacks.log
521+
sudo wifite --monitor-attacks --monitor-channel 1 --no-tui --monitor-log attacks.log
527522
```
528523

529524
**Incident Response:**
@@ -576,7 +571,7 @@ sudo wifite -i wlan0mon --monitor-attacks --monitor-channel 6 --monitor-log comp
576571
**Optimization Tips:**
577572
- Use `--monitor-channel` to focus on specific channels for better performance
578573
- Avoid channel hopping on busy networks to reduce CPU usage
579-
- Use classic mode (`--classic`) on resource-constrained systems
574+
- Use classic mode (`--no-tui`) on resource-constrained systems
580575
- Regularly rotate log files to prevent excessive disk usage
581576

582577
**Scalability:**
@@ -866,10 +861,10 @@ Performance Tips
866861
* **Use a dedicated wireless adapter** - USB adapters often perform better than built-in cards
867862
* **Position matters** - Get closer to target networks for better signal strength
868863
* **Choose the right channel** - Use `-c <channel>` to focus on specific channels
869-
* **Limit concurrent attacks** - Use `--first 5` to attack only the strongest targets first
864+
* **Limit concurrent attacks** - Use `-first 5` to attack only the strongest targets first
870865

871866
### Speed Optimization
872-
* **PMKID first** - Try `--pmkid-only` for fastest WPA/WPA2 attacks (no clients needed)
867+
* **PMKID first** - Try `--pmkid` for fastest WPA/WPA2 attacks (no clients needed)
873868
* **Skip WPS on modern routers** - Use `--no-wps` on newer routers that likely have WPS disabled
874869
* **Use wordlists efficiently** - Start with common passwords, use `--dict <wordlist>`
875870
* **WPA3 transition mode** - Downgrade attacks are faster than pure SAE capture
@@ -923,7 +918,7 @@ Troubleshooting
923918

924919
**Handshake capture issues:**
925920
- Ensure clients are connected to the target network
926-
- Use `--deauth-count` to increase deauth attempts
921+
- Use `--num-deauths` to increase deauth attempts
927922
- Some networks may require longer capture times
928923

929924
**WPA3 attack issues:**
@@ -944,7 +939,7 @@ Troubleshooting
944939
- **No attacks detected:** Ensure your wireless adapter is in monitor mode and positioned to receive signals
945940
- **Permission denied:** Run wifite with `sudo` - packet capture requires root privileges
946941
- **High CPU usage:** Use `--monitor-channel` instead of `--monitor-hop` to reduce processing load
947-
- **TUI not displaying:** Try classic mode with `--classic` or check terminal compatibility
942+
- **TUI not displaying:** Try classic mode with `--no-tui` or check terminal compatibility
948943
- **Log file not created:** Verify write permissions for the log file path
949944
- **Interface errors:** Ensure no other tools (airodump-ng, etc.) are using the interface
950945

@@ -973,15 +968,6 @@ Documentation
973968

974969
### Comprehensive Guides
975970

976-
* **[Attack Monitoring Guide](docs/ATTACK_MONITORING_GUIDE.md)** - Complete guide to wireless attack monitoring
977-
* Legal requirements and authorization
978-
* Installation and setup
979-
* Basic and advanced usage
980-
* TUI interface explanation
981-
* Log file analysis techniques
982-
* Use cases and best practices
983-
* Troubleshooting and FAQ
984-
985971
* **[Evil Twin Attack Guide](docs/EVILTWIN_GUIDE.md)** - Complete guide to Evil Twin attacks
986972
* Hardware and software requirements
987973
* Usage examples and advanced options
@@ -1000,6 +986,10 @@ Documentation
1000986

1001987
* **[WPA3 Troubleshooting](docs/WPA3_TROUBLESHOOTING.md)** - WPA3-specific issues and solutions
1002988

989+
* **[WPA3 Detection Optimization](docs/WPA3_DETECTION_OPTIMIZATION.md)** - WPA3 detection and optimization details
990+
991+
* **[Dual Interface Examples](docs/DUAL_INTERFACE_EXAMPLES.md)** - Dual wireless interface usage examples
992+
1003993
### Quick Reference
1004994

1005995
For quick help on any feature, use the verbose help flag:

0 commit comments

Comments
 (0)