Fern Wifi Cracker Mac Address

Fix Fern Wifi for Alfa AWUS036NH / wlan*mon pattern

This is one of the easiest process to crack a wifi wpa/wap2 network. Everything is made easy with fern wifi cracker, which is one of the most widely used tools for cracking a wifi network. Fern Wifi cracker is mostly used for brute forcing a handshake file of a specified router. Fern WIFI cracker. Disclaimer: I carried out this attack using my own WIFI network, all MAC Addresses and names have been faked. This tutorial is for learning purposes only and should not be used for any illegal activities. Introduction: This is a step by step on how to use the Fern WIFI Cracker that comes installed with Kali-Linux.

  • Fern Wifi Cracker Package Description. Fern Wifi Cracker is a Wireless security auditing and attack software program written using the Python Programming Language and the Python Qt GUI library, the program is able to crack and recover WEP/WPA/WPS keys and also run other network based attacks on wireless or ethernet based networks.
  • Step 3: Select Fern WiFi Cracker. Step 3 (wifi hack) Step 4: In Fern WiFi Cracker window click on Select Interface and then select your wireless interface usually it will be wlan0. Step 5: Then click on Scan for Access points. Step 6: After Scan is completed click on WiFi WPA icon. Step 7: Then Attack Panel will open.
Fern wifi cracker tutorial
gistfile1.py
Address
''
Fern-Wifi-Cracker 2.0 Not working with Ralink Chipsets (tested on AWUS036NH )
What steps will reproduce the problem?
1.start fern-wifi
2.select interface
What is the expected output? What do you see instead?
expected output: 'Monitor mode enabled on wlan0mon'
instead: stuck in set_monitor_thread()
What version of the product are you using? On what operating system?
Linux Mint 64:
Linux xxxxxxxx 3.13.0-24-generic #47-Ubuntu SMP Fri May 2 23:30:00 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux
Please provide any additional information below.
the reason: you only search for monitors with *mon pattern
realtek chipsets and recent airmon-ng version use a new pattern: wlandmon
here is a bugfix, i use for my version:
''
defset_monitor_thread(self,monitor_card,mac_setting_exists,last_settings):
#print 'starting new thread'
status=str(commands.getoutput('airmon-ng start %s'%(monitor_card)))
#print 'nStatus of airmon-ng start', monitor_card, ':', status,'n'
if ('monitor mode enabled'instatus) or ('monitor mode vif enabled'instatus): #fix for ralink if
monitor_interface_process=str(commands.getoutput('airmon-ng'))
#print 'monitor_interface_process:', monitor_interface_process, 'n'
if ('monitor mode enabled'instatus):
regex=re.compile('mond',re.IGNORECASE)
elif ('monitor mode vif enabled'instatus):
regex=re.compile('wlandmon',re.IGNORECASE) #changed from mond to wlandmon
interfaces=regex.findall(monitor_interface_process)
print'available interfaces:', interfaces
if(interfaces):
self.monitor_interface=interfaces[0]
else:
self.monitor_interface=monitor_card
print'setting self.monitor_interface to', self.monitor_interface
variables.monitor_interface=self.monitor_interface
self.interface_combo.setEnabled(False)
variables.wps_functions.monitor_interface=self.monitor_interface
self.emit(QtCore.SIGNAL('monitor mode enabled'))
# Create Fake Mac Address and index for use
mon_down=commands.getstatusoutput('ifconfig %s down'%(self.monitor_interface))
ifmac_setting_exists:
variables.exec_command('macchanger -m %s %s'%(last_settings,self.monitor_interface))
else:
variables.exec_command('macchanger -A %s'%(self.monitor_interface))
mon_up=commands.getstatusoutput('ifconfig %s up'%(self.monitor_interface))
foriterateinos.listdir('/sys/class/net'):
ifstr(iterate) str(self.monitor_interface):
os.chmod('/sys/class/net/'+self.monitor_interface+'/address',0777)
variables.monitor_mac_address=reader('/sys/class/net/'+self.monitor_interface+'/address').strip()
variables.wps_functions.monitor_mac_address=variables.monitor_mac_address
else:
print'problem occured while setting up the monitor mode of selected', monitor_card

commented Jan 4, 2015

Address

Fern Wifi Cracker With Geographical Location Mac Address Tracker

now intergrated in Fern-Wifi-Cracker 2.1 ( https://code.google.com/p/fern-wifi-cracker/issues/detail?id=97 )

commented Jan 21, 2015

Hello,

I use Kali Linux in VMware Fusion (Mac OS X).
Linux secu 3.14-kali1-amd64 #1 SMP Debian 3.14.5-1kali1 (2014-06-07) x86_64 GNU/Linu
Device: AWUSI36NH

When i choose the wlan0 (AWUSO36NH) on fern-wifi, a problem appears ...

I'm trying to attack and WPA access.
I plug the device, i run in CLI airmon and airodump on the BSSID... i see stations, get Handshake etc...
When i run Fern-Wifi-Cracker 2.1, it sees AP but it can't get MAC to run the classic attack. When i kill fern-wifi cracker and re test airodump, it doesn't see station.. nothing appears. Unplug and replug device and airodump works again.

So i think Fern-Wifi Cracker doesn't work well with AWUS036NH.

Sorry for my poor english.

Fern Wifi Cracker Mac Address Settings

Sign up for freeto join this conversation on GitHub. Already have an account? Sign in to comment