📜  fern wifi craker (1)

📅  最后修改于: 2023-12-03 15:00:44.637000             🧑  作者: Mango

Fern Wifi Cracker

Fern Wifi Cracker is an open-source WiFi security tool designed to help network administrators and security professionals discover vulnerabilities in wireless networks. It is capable of cracking WEP, WPA/WPA2-PSK authentication, SSID broadcasting, and other wireless security protocols.

Features
  • WEP Cracking with Fragmentation, Chop-Chop, Caffe-Latte, Hirte, ARP Request Replay, or WPS attack
  • WPA/WPA2 Cracking with Dictionary or Brute Force attacks
  • Automatic Access Point Attack System
  • Hidden SSID discovery
  • Rogue Access Point creation
  • Packet injection tool
  • WPS PIN recovery tool
  • Customizable key generation and cracking options
  • Multi-language support
Installation

Fern Wifi Cracker can be installed on various Linux distributions, including Ubuntu, Debian, Kali Linux, and others. The easiest way to install Fern Wifi Cracker is by using the following command:

sudo apt-get install fern-wifi-cracker

You can also download the source code from the official GitHub repository and compile it manually.

Usage

After installing Fern Wifi Cracker, you can launch it by typing the following command in the terminal:

sudo fern-wifi-cracker

Fern Wifi Cracker has both a command-line interface and a graphical user interface. The GUI version provides an easier way to use the tool, but the CLI version is more flexible and powerful.

To start cracking a network, you need to select the target access point from the list of available networks. Fern Wifi Cracker will automatically detect the encryption type of the selected network and suggest the appropriate attack method.

Conclusion

Fern Wifi Cracker is a powerful tool for WiFi security testing and vulnerability assessment. It should only be used for legal and authorized purposes, such as testing the security of your own network or performing security audits for clients. Misusing this tool can lead to legal consequences and harm to innocent people.