Fern Wifi Cracker – Wireless Security Auditing Tool

Use Netsparker


Fern Wifi Cracker is a Wireless security auditing and attack software program written using the Python Programming Language and the Python Qt GUI library, the program is able to crack and recover WEP/WPA/WPS keys and also run other network based attacks on wireless or ethernet based networks.

Fern Wifi Cracker - Wireless Security Auditing Tool


The Software runs on any Linux machine with prerequisites installed, and it has been tested on Ubuntu KDE/Gnome, BackTrack Linux and BackBox Linux.

What is a Wifi Cracker

A Wifi Cracker is a tool or piece of software designed to help with the recovery of Wireless Access Point (WAP) keys from WPA2 or WPS secured networks.

There are various Wifi Cracker tools available such as:

Infernal Twin – Automated Wireless Hacking Suite
FruityWifi – Wireless Network Auditing Tool
wifite – Mass Wifi WEP/WPA Key Cracking Tool
Kismet – Wireless Network Hacking, Sniffing & Monitoring

Features of Fern Wifi Cracker

Fern currently supports:

  • WEP Cracking with Fragmentation,Chop-Chop, Caffe-Latte, Hirte, ARP Request Replay or WPS attack
  • WPA/WPA2 Cracking with Dictionary or WPS based attacks
  • Automatic saving of key in database on successful crack
  • Automatic Access Point Attack System
  • Session Hijacking (Passive and Ethernet Modes)
  • Access Point MAC Address Geo Location Tracking
  • Internal MITM Engine
  • Bruteforce Attacks (HTTP,HTTPS,TELNET,FTP)
  • Update Support

Prerequisites for Fern Wifi Cracker

Fern requires the following to run properly:

  • Aircrack-NG
  • Python-Scapy
  • Python Qt4
  • Python
  • Subversion
  • Xterm
  • Reaver (for WPS Attacks)
  • Macchanger

You can download Fern Wireless Cracker here:

fern-wifi-cracker-v2.4.zip

Or read more here.

Posted in: Hacking Tools, Networking Hacking, Wireless Hacking

, , , ,


Latest Posts:


Acunetix Vulnerability Scanner For Linux Now Available Acunetix Vulnerability Scanner For Linux Now Available
Acunetix Vulnerability Scanner For Linux is now available, now you get all of the functionality of Acunetix, with all of the dependability of Linux.
Gerix WiFi Cracker - Wireless 802.11 Hacking Tool With GUI Gerix WiFi Cracker – Wireless 802.11 Hacking Tool With GUI
Gerix WiFi cracker is an easy to use Wireless 802.11 Hacking Tool with a GUI, it was originally made to run on BackTrack and this version has been updated for Kali (2018.1).
Malcom - Malware Communication Analyzer Malcom – Malware Communication Analyzer
Malcom is a Malware Communication Analyzer designed to analyze a system's network communication using graphical representations of network traffic.
WepAttack - WLAN 802.11 WEP Key Hacking Tool WepAttack – WLAN 802.11 WEP Key Hacking Tool
WepAttack is a WLAN open source Linux WEP key hacking tool for breaking 802.11 WEP keys using a wordlist based dictionary attack.
Eraser - Windows Secure Erase Hard Drive Wiper Eraser – Windows Secure Erase Hard Drive Wiper
Eraser is a hard drive wiper for Windows which allows you to run a secure erase and completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns.
Insecure software versions are a problem Web Security Stats Show XSS & Outdated Software Are Major Problems
Netsparker just published some anonymized Web Security Stats about the security vulnerabilities their online solution identified on their users’ web applications and web services during the last 3 years.


2 Responses to Fern Wifi Cracker – Wireless Security Auditing Tool

  1. Henry December 14, 2016 at 6:35 pm #

    Hello,

    I wasn’t sure how to go about asking so figured id just ask on one of your recent posts.

    I’m curious about types of malware. It is possible to combined the attributes of reverse shell malware and also the replicating attributes of a worm?

    So basically the malware would propagate round a LAN and give the attacker access to every machine it infects.

    I understand you would have to be an expert to code something like this. However, is it possible?

     

    Henry :)

    • Darknet December 14, 2016 at 8:51 pm #

      Yes it’s possible, and such things already exist. Most worms work via an exploit to gain access, then scan the network and spread further.