- Fern Wifi Cracker With Geographical Location Mac Address Tracker
- Fern Wifi Cracker Mac Address Settings
This is one of the easiest process to crack a wifi wpa/wap2 network. Everything is made easy with fern wifi cracker, which is one of the most widely used tools for cracking a wifi network. Fern Wifi cracker is mostly used for brute forcing a handshake file of a specified router. Fern WIFI cracker. Disclaimer: I carried out this attack using my own WIFI network, all MAC Addresses and names have been faked. This tutorial is for learning purposes only and should not be used for any illegal activities. Introduction: This is a step by step on how to use the Fern WIFI Cracker that comes installed with Kali-Linux.
- Fern Wifi Cracker Package Description. Fern Wifi Cracker is a Wireless security auditing and attack software program written using the Python Programming Language and the Python Qt GUI library, the program is able to crack and recover WEP/WPA/WPS keys and also run other network based attacks on wireless or ethernet based networks.
- Step 3: Select Fern WiFi Cracker. Step 3 (wifi hack) Step 4: In Fern WiFi Cracker window click on Select Interface and then select your wireless interface usually it will be wlan0. Step 5: Then click on Scan for Access points. Step 6: After Scan is completed click on WiFi WPA icon. Step 7: Then Attack Panel will open.
'' |
Fern-Wifi-Cracker 2.0 Not working with Ralink Chipsets (tested on AWUS036NH ) |
What steps will reproduce the problem? |
1.start fern-wifi |
2.select interface |
What is the expected output? What do you see instead? |
expected output: 'Monitor mode enabled on wlan0mon' |
instead: stuck in set_monitor_thread() |
What version of the product are you using? On what operating system? |
Linux Mint 64: |
Linux xxxxxxxx 3.13.0-24-generic #47-Ubuntu SMP Fri May 2 23:30:00 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux |
Please provide any additional information below. |
the reason: you only search for monitors with *mon pattern |
realtek chipsets and recent airmon-ng version use a new pattern: wlandmon |
here is a bugfix, i use for my version: |
'' |
defset_monitor_thread(self,monitor_card,mac_setting_exists,last_settings): |
#print 'starting new thread' |
status=str(commands.getoutput('airmon-ng start %s'%(monitor_card))) |
#print 'nStatus of airmon-ng start', monitor_card, ':', status,'n' |
if ('monitor mode enabled'instatus) or ('monitor mode vif enabled'instatus): #fix for ralink if |
monitor_interface_process=str(commands.getoutput('airmon-ng')) |
#print 'monitor_interface_process:', monitor_interface_process, 'n' |
if ('monitor mode enabled'instatus): |
regex=re.compile('mond',re.IGNORECASE) |
elif ('monitor mode vif enabled'instatus): |
regex=re.compile('wlandmon',re.IGNORECASE) #changed from mond to wlandmon |
interfaces=regex.findall(monitor_interface_process) |
print'available interfaces:', interfaces |
if(interfaces): |
self.monitor_interface=interfaces[0] |
else: |
self.monitor_interface=monitor_card |
print'setting self.monitor_interface to', self.monitor_interface |
variables.monitor_interface=self.monitor_interface |
self.interface_combo.setEnabled(False) |
variables.wps_functions.monitor_interface=self.monitor_interface |
self.emit(QtCore.SIGNAL('monitor mode enabled')) |
# Create Fake Mac Address and index for use |
mon_down=commands.getstatusoutput('ifconfig %s down'%(self.monitor_interface)) |
ifmac_setting_exists: |
variables.exec_command('macchanger -m %s %s'%(last_settings,self.monitor_interface)) |
else: |
variables.exec_command('macchanger -A %s'%(self.monitor_interface)) |
mon_up=commands.getstatusoutput('ifconfig %s up'%(self.monitor_interface)) |
foriterateinos.listdir('/sys/class/net'): |
ifstr(iterate) str(self.monitor_interface): |
os.chmod('/sys/class/net/'+self.monitor_interface+'/address',0777) |
variables.monitor_mac_address=reader('/sys/class/net/'+self.monitor_interface+'/address').strip() |
variables.wps_functions.monitor_mac_address=variables.monitor_mac_address |
else: |
print'problem occured while setting up the monitor mode of selected', monitor_card |
commented Jan 4, 2015
Fern Wifi Cracker With Geographical Location Mac Address Tracker
now intergrated in Fern-Wifi-Cracker 2.1 ( https://code.google.com/p/fern-wifi-cracker/issues/detail?id=97 ) |
commented Jan 21, 2015
Hello, I use Kali Linux in VMware Fusion (Mac OS X). When i choose the wlan0 (AWUSO36NH) on fern-wifi, a problem appears ... I'm trying to attack and WPA access. So i think Fern-Wifi Cracker doesn't work well with AWUS036NH. Sorry for my poor english. |