Fern Wifi Cracker – Wireless Security Auditing Tool

Keep on Guard!


Fern Wifi Cracker is a Wireless security auditing and attack software program written using the Python Programming Language and the Python Qt GUI library, the program is able to crack and recover WEP/WPA/WPS keys and also run other network based attacks on wireless or ethernet based networks.

Fern Wifi Cracker - Wireless Security Auditing Tool

The Software runs on any Linux machine with prerequisites installed, and it has been tested on Ubuntu KDE/Gnome, BackTrack Linux and BackBox Linux.

Features

Fern currently supports:

  • WEP Cracking with Fragmentation,Chop-Chop, Caffe-Latte, Hirte, ARP Request Replay or WPS attack
  • WPA/WPA2 Cracking with Dictionary or WPS based attacks
  • Automatic saving of key in database on successful crack
  • Automatic Access Point Attack System
  • Session Hijacking (Passive and Ethernet Modes)
  • Access Point MAC Address Geo Location Tracking
  • Internal MITM Engine
  • Bruteforce Attacks (HTTP,HTTPS,TELNET,FTP)
  • Update Support

Prerequisites

Fern requires the following to run properly:

  • Aircrack-NG
  • Python-Scapy
  • Python Qt4
  • Python
  • Subversion
  • Xterm
  • Reaver (for WPS Attacks)
  • Macchanger

You can download Fern here:

fern-wifi-cracker-v2.4.zip

Or read more here.


Posted in: Hacking Tools, Network Hacking, Wireless Hacking

, , , , , , , ,

Recent in Hacking Tools:
- Stitch – Python Remote Administration Tool AKA RAT
- Webbies Toolkit – Web Recon & Enumeration Tools
- OWASP VBScan – vBulletin Vulnerability Scanner

Related Posts:

Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 2,009,718 views
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,549,353 views
- wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool - 697,551 views


2 Responses to Fern Wifi Cracker – Wireless Security Auditing Tool

  1. Henry December 14, 2016 at 6:35 pm #

    Hello,

    I wasn’t sure how to go about asking so figured id just ask on one of your recent posts.

    I’m curious about types of malware. It is possible to combined the attributes of reverse shell malware and also the replicating attributes of a worm?

    So basically the malware would propagate round a LAN and give the attacker access to every machine it infects.

    I understand you would have to be an expert to code something like this. However, is it possible?

     

    Henry :)

    • Darknet December 14, 2016 at 8:51 pm #

      Yes it’s possible, and such things already exist. Most worms work via an exploit to gain access, then scan the network and spread further.