Wi-Fi Crack allows you to crack any wireless network with WEP security. Powered by AirCrack-NG, the popular, cross-platform, wireless security cracking command-line tool, Wi-Fi Crack takes you step-by-step through the process of cracking the security of a WEP-based wireless network using a beautiful OS X graphical user interface. Fern WiFi Wireless Cracker tool is the most popular WiFi Cracker tool used in recent times due to its wireless attack feature and security auditing tool. Recover all sorts of keys and passwords, run attacks on all wireless networks, discover network traffic and do much more using this free WiFi Cracker tool. What is WiFi Cracker Software? Fern WiFi Wireless Cracker tool is the most popular WiFi Cracker tool used in recent times due to its wireless attack feature and security auditing tool. Recover all sorts of keys and passwords, run attacks on all wireless networks, discover network traffic and do much more using this free WiFi Cracker tool. What is WiFi Cracker Software?
'' |
Fern-Wifi-Cracker 2.0 Not working with Ralink Chipsets (tested on AWUS036NH ) |
What steps will reproduce the problem? |
1.start fern-wifi |
2.select interface |
What is the expected output? What do you see instead? |
expected output: 'Monitor mode enabled on wlan0mon' |
instead: stuck in set_monitor_thread() |
What version of the product are you using? On what operating system? |
Linux Mint 64: |
Linux xxxxxxxx 3.13.0-24-generic #47-Ubuntu SMP Fri May 2 23:30:00 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux |
Please provide any additional information below. |
the reason: you only search for monitors with *mon pattern |
realtek chipsets and recent airmon-ng version use a new pattern: wlandmon |
here is a bugfix, i use for my version: |
'' |
defset_monitor_thread(self,monitor_card,mac_setting_exists,last_settings): |
#print 'starting new thread' |
status=str(commands.getoutput('airmon-ng start %s'%(monitor_card))) |
#print 'nStatus of airmon-ng start', monitor_card, ':', status,'n' |
if ('monitor mode enabled'instatus) or ('monitor mode vif enabled'instatus): #fix for ralink if |
monitor_interface_process=str(commands.getoutput('airmon-ng')) |
#print 'monitor_interface_process:', monitor_interface_process, 'n' |
if ('monitor mode enabled'instatus): |
regex=re.compile('mond',re.IGNORECASE) |
elif ('monitor mode vif enabled'instatus): |
regex=re.compile('wlandmon',re.IGNORECASE) #changed from mond to wlandmon |
interfaces=regex.findall(monitor_interface_process) |
print'available interfaces:', interfaces |
if(interfaces): |
self.monitor_interface=interfaces[0] |
else: |
self.monitor_interface=monitor_card |
print'setting self.monitor_interface to', self.monitor_interface |
variables.monitor_interface=self.monitor_interface |
self.interface_combo.setEnabled(False) |
variables.wps_functions.monitor_interface=self.monitor_interface |
self.emit(QtCore.SIGNAL('monitor mode enabled')) |
# Create Fake Mac Address and index for use |
mon_down=commands.getstatusoutput('ifconfig %s down'%(self.monitor_interface)) |
ifmac_setting_exists: |
variables.exec_command('macchanger -m %s %s'%(last_settings,self.monitor_interface)) |
else: |
variables.exec_command('macchanger -A %s'%(self.monitor_interface)) |
mon_up=commands.getstatusoutput('ifconfig %s up'%(self.monitor_interface)) |
foriterateinos.listdir('/sys/class/net'): |
ifstr(iterate) str(self.monitor_interface): |
os.chmod('/sys/class/net/'+self.monitor_interface+'/address',0777) |
variables.monitor_mac_address=reader('/sys/class/net/'+self.monitor_interface+'/address').strip() |
variables.wps_functions.monitor_mac_address=variables.monitor_mac_address |
else: |
print'problem occured while setting up the monitor mode of selected', monitor_card |
commented Jan 4, 2015
now intergrated in Fern-Wifi-Cracker 2.1 ( https://code.google.com/p/fern-wifi-cracker/issues/detail?id=97 ) |
commented Jan 21, 2015
Hello, I use Kali Linux in VMware Fusion (Mac OS X). When i choose the wlan0 (AWUSO36NH) on fern-wifi, a problem appears ... I'm trying to attack and WPA access. So i think Fern-Wifi Cracker doesn't work well with AWUS036NH. Sorry for my poor english. |
Today we will cover cracking WEP Wifi Network Encryption with Fern Wifi Cracker. This Hacking tool comes prepacked in Kali Linux. This is a relatively simple process anyone can do with the proper equipment and following this tutorial.
First you will want to get a copy of Kali Linux. You can either run this as a LiveDVD, install it BareMetal, or do like I did and put it in a virtual machine.
I recommend using an Alfa Wifi Adapter to maximize your signal and range. Alfa adapters are perfect for hacking in Kali Linux because you don’t have to install any drivers and they also patch through to virtual machines, unlike your internal wifi cards.
Find a WEP Network!
If you don’t know where one is, you can use Wigle Wifi to find one:
Check out my Wigle Wifi Video: http://www.youtube.com/watch?v=mm5MoncX8zk
Set your Wifi Adapter to Monitor Mode!
Now, get Kali Linux up and running.
-Open your Shell
-Check “iwconfig” and “ifconfig” to make sure you have your wireless card showing up.
-Use “airmon-ng check” to see if processes will interfere with your monitor mode.
-Kill them using “airmon-ng check kill”
-Turn on Monitor Mode by typing “airmon-ng start wlanX”
-Close your Shell
Fern Wifi Cracker Mac Download
Use Fern Wifi Cracker!
On the System Menu:
Applications –> Kali Linux –> Wireless Attacks –> 802.11 Wireless Tools –> fern-wifi-cracker
-Now, select your interface for wifi. It will tell you that Mon is on.
-Press “Scan for Access Points”
-Now, choose WEP.
-Select the WEP network you wish to crack.
-Put a check mark on “Automate” and then click “Attack”
-Now it will step through: Associating with Access Point, Gathering Packets, Injecting ARP Packets, and Cracking Encryption…
Fern Wifi Cracker Stuck Deauthenticating
If there is good traffic happening on the WEP Network, you will get through in 10 to 15 minutes.
If there is not a lot of traffic and your ivs is gathering real slow, you may have to leave it quite a while, or overnight.
Some time after the entire bar is full, it should be able to crack the encryption and give you the connection key!
Using Fern Wifi Cracker
Do a cartwheel…