Wifite is an automated wireless penetration-testing tool that utilizes the tools associated with Aircrack-ng and the Reaver and PixieWPS command-line tools.
This gives Wifite the ability to capture traffic and reverse the authentication credentials for WEP-, WPA-, and WPS-type wireless networks. Navigate to Applications | Wireless Attacks | Wifite or through command line to start Wifite:
# wifite
Either will bring you to the initial screen:
Wifite will automatically put the wireless card into monitor mode and then start to scan for wireless networks:
Once you see the target network in the list, in this case the ESSID or broadcast SSID Brenner, hit Ctrl + C. At that time, you will be prompted to enter either a single number or a range for testing. In this case, we enter the number 4 and hit Enter:
Wifite automatically starts the WPS Pixie attack by capturing the necessary information. If successful, the following will display:
If the WPS vulnerability is present, as in the case of the wireless network here, Wifite is able to determine both the WPA key and the PIN.