FernWiFi cracker, The name says about it. It's a GUI based WiFi security auditing tool that written on Python. Fern WiFi cracker can crack and recover WEP/WPA/WPS keys and also run other network based attacks on wireless or Ethernet based networks. Fern created by Saviour Emmanuel Ekiko.
Every time we open fern it will check for update and if we have a updated version of Kali then it will ask us to use it's professional version. It is available for purchase in -
pro.com. We are not going to buy it so we choose "No" and the main menu of Fern opens like the following screenshot:
Now we select the network interface. Usually our devices internal WiFi is the wlan0 interface and to use monitor modes from our external WiFi adapter we need to select wlan1 interface, as we did in the following screenshot:
Here we need a dictionary file. A dictionary file/wordlist is a text file that contains lots of passwords. Our attack will follow the brute-force method first it capture the handshake file from the WiFi network then it try to crack the handshake file by brute-force method from our given password file. We will discuss about how it works later.
Here we discuss on the basics without diving deeper technological terms. We know that when we connect our device to a new protected WiFI we need the password. But from the second time we don't need the the password, Why? Because the password stored in our device for that WiFi network. It stores the hash value of password (not the plain text).
When we try to connect for second time the device sends the password in hash format to the WiFi router and asks to connect (handshake). The router checks everything is correct and allow it to connect.
This tool sends de-authentication packets to the router using our special WiFi adapter.(That's why we need a WiFi router that supports packet injection). For the de-authentication packets all the connected devices with the router got disconnected and as we know after this those disconnected devices again try to connect with the target router.
Now these passwords are encrypted and we need a list of password and our tool with match this hash one by one from our given passwordlist (wordlist or dictionary file). This is brute-force attack. If the password will be in our list then we can get it easily. Bigger size of wordlists can increase provide us higher success rate. Come on almost everyone uses common passwords, because these kind of passwords are easy to remember.
Disclaimer: This tutorial is for educational propose. Attacking others devices considered as criminal offense. We don't support that. This is for spreading awareness that we should choose a very strong password for us. We have used this against our own network.
Love our articles? Make sure to follow us on Twitter and GitHub, we post article updates there. To join our KaliLinuxIn family, join our Telegram Group. We are trying to build a community for Linux and Cybersecurity. For anything we always happy to help everyone on the comment section. As we know our comment section is always open to everyone. We read each and every comment and we always reply.
However, I observed in all three that i am not getting any mac addresses connected to my router or clients that are showing whenever i use aircrack, wifite and the fern tools. I do have multiple devices connected and one of which is my phone, but apparently i'm not able to see any clients in my stuff.
To add up, i'm not sure if my wireless chipset is being supported by these tools. Monitor mode is being enabled, but i'm not sure if this is enough. So far i only know that this is my chipset: Broadcom BCM43xx 1.0 (7.21.171.130.1a1)
If you clicked the link I am stuck in step 8. In step 8, I don't see any clients connected to my router, but there are devices connected. I tried both being close and not to distant to my router, but still no luck. I also tried to leave my laptop for 4 hours straight, but still no clients showing up. Not sure if i need to wait for more than that.
Hey so i am thinking to upgrade to blackarch version from dragonized and I am gonna run this command sudo pacman -S pipewire-support xorg-server xorg-xwayland xorg-xhost xorg-xinit xorg-xinput xorg-xrandr xorg-xprop autorandr xdg-desktop-portal xdg-desktop-portal-kde networkmanager-iwd ufw beautyline candy-icons-git garuda-blackarch garuda-dr460nized garuda-fish-config kvantum-qt5 plymouth-theme-dr460nized grub-theme-garuda-dr460nized xcursor-sweet garuda-settings-manager-kcm garuda-settings-manager-knotifier sddm sddm-kcm bluedevil kde-gtk-config kde-servicemenus-komparemenu khotkeys kinfocenter kscreen kwallet-pam kwayland-integration kwin kwin-scripts-forceblur plasma-browser-integration plasma-desktop plasma-nm plasma-pa plasma-thunderbolt plasma-firewall plasma-systemmonitor plasma5-applets-eventcalendar plasma5-applets-window-appmenu plasma5-applets-window-buttons plasma5-applets-window-title powerdevil quota-tools ark dolphin dolphin-plugins kate kde-servicemenus-rootactions kdeconnect konsole okular partitionmanager spectacle ffmpegthumbs kdegraphics-thumbnailers kimageformats qt5-imageformats resvg sshfs firedragon latte-dock-git libinput_gestures_qt mpv 8192eu-dkms 8188eu-aircrack-dkms-git 8188fu-kelebek333-dkms-git rtl8192cu-fixes-git rtl88xxau-aircrack-dkms-git rtl8814au-aircrack-dkms-git rtl88x2bu-dkms-git rtl88x2ce-dkms tor openresolv aircrack-ng amass arp-scan aquatone autopsy beef binwalk blackarch-keyring blackarch-menus blackarch-mirrorlist bulk-extractor bully burpsuite cewl chntpw commix crackmapexec creddump crunch davtest dbd dirb dirbuster dmitry dns2tcp dnschef dnsenum dnsrecon enum4linux exiv2 exploitdb faradaysec fern-wifi-cracker ffuf fierce findomain fping gnu-netcat gobuster guymager hashcat hashcat-utils hashdeep hashid hash-identifier hping hotpatch httpx hydra ike-scan inetsim iodine john kismet laudanum lbd legion lulzbuster macchanger magicrescue maltego maskprocessor masscan metasploit msfdb mimikatz mitmproxy multimac nbtscan ncrack netdiscover netmask netsed netsniff-ng ngrep nikto nmap onesixtyone ophcrack patator pdfid pdf-parser pipal pixiewps powersploit proxychains-ng proxytunnel pth-toolkit ptunnel pwnat radare2 reaver rebind recon-ng redsocks responder rsmangler sakis3g samdump2 sbd scalpel scrounge-ntfs seclists set skipfish sleuthkit smbmap snmpcheck socat sploitctl spiderfoot spooftooph sqlmap ssldump sslscan sslsplit sslyze statsprocessor stunnel swaks tcpdump tcpick tcpreplay thc-ipv6 thc-pptp-bruter torctl theharvester udptunnel unix-privesc-check veil voiphopper wafw00f wce webshells weevely wfuzz whatweb whois wifite windows-binaries winexe wireshark-qt wordlistctl wpscan zaproxy zdns zgrab2 zmap ccache cmake gdb jre-openjdk go rustup
I wont be installing the settings things as showed in the upgrade faq as i am not upgrading the desktop environment in this case KDE shall I go ahead?
And when it comes to tools Kali Linux always stands first in providing us with easy to use tools. So, here is a list of tools that one may use to crack the password of wifi, But before that use these tools to learn by using them on your Wifi modem or by taking the permissions from the owner of the network.
Aircrack is an all in one packet sniffer, WEP and WPA/WPA2 cracker, analyzing tool and a hash capturing tool. It is a tool used for wifi hacking. It helps in capturing the package and reading the hashes out of them and even cracking those hashes by various attacks like dictionary attacks. It supports almost all the latest wireless interfaces.
PixieWPS is a tool used to perform the brute force attack on WPS pins to crack them. It is a tool written in C language and has a lot of features like checksum optimization, Reduced entropy of the seed, Small Diffie-Hellman keys, etc.
When it comes to wifi Hacking wifite is one of the most useful tools when you have a lot of wireless devices across your location. It is used to crack WEP or WPA/WPS encrypted wireless networks in a row. It could easily be customized to automate the process of multiple wifi hacking. It comes packed with many features, few of them are listed below.
Fern wifi cracker is used when we want a Graphical User Interface to crack wifi passwords. Fern is a widely used wifi hacking tool designed in Python Programming Language using the Python Qt GUI library. The tools are comfortable to attack wireless networks along with ethernet networks. Fern comes packed with many features, few of them are listed below.
In this article we will explore a pentesting tool called fern WiFi cracker. fern WiFi cracker is an easy to use GUI based WiFi hacker tool which anyone can use. There are no complicated terminal commands required to use this WiFi hacker tool. fern WiFi cracker comes preloaded with Kali Linux. You can also install this WiFi hacker tool in almost any Linux based distro.
fern WiFi Cracker is written in Python. It uses Python Qt GUI library. Program can crack and recover WEP/WPA/WPS keys and run other critical network based attacks on wireless or ethernet based networks as well.
A graphical interface for the tool will open up as shown below. Now first thing you need to do is select your network interface. As you select your network interface, it will enable monitor mode on the selected interface.
Now go ahead and hit browse button and look for password list file. In order to crack a WiFi password you need to have a password-list which you can use to brute-force the wireless network. You can easily get multiple password text-file on the internet.
So to create word list for our brute-force attack we will be using a program called crunch. crunch comes pre-installed in Kali. For any other distribution you can easily download it from the software repository.
We can shorten this process based on the acquired knowledge of the target. For instance if we somehow know that the target always uses number passwords between 6 and 8 characters? We could create a complete list of password possibilities meeting this criteria and save them to a file in our desired directory by running the following command.
3a8082e126