Fern Wifi Cracker is a Wireless security auditing and attack software program written using the Python Programming Language and the Python Qt GUI library, the program is able to crack and recover WEP/WPA/WPS keys and also run other network based attacks on wireless or ethernet based networks. Fern WiFi cracker is GUI based tool to crack wireless encryption. It comes preinstalled with Kali Linux. How to hack wifi Password using Fern WiFi Cracker. First of all you need to install Kali Linux either in Virtual Box or as a main operating system. Alternatively you can use Kali Linux Live. Wifi WEP WPA Fern Pro Fern Wifi Audit Wifi Linux WPS DHCP DNS SERVER. Sudo apt-get install fern-wifi-cracker Which will install fern-wifi-cracker and any other packages on which it depends.
'' |
Fern-Wifi-Cracker 2.0 Not working with Ralink Chipsets (tested on AWUS036NH ) |
What steps will reproduce the problem? |
1.start fern-wifi |
2.select interface |
What is the expected output? What do you see instead? |
expected output: 'Monitor mode enabled on wlan0mon' |
instead: stuck in set_monitor_thread() |
What version of the product are you using? On what operating system? |
Linux Mint 64: |
Linux xxxxxxxx 3.13.0-24-generic #47-Ubuntu SMP Fri May 2 23:30:00 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux |
Please provide any additional information below. |
the reason: you only search for monitors with *mon pattern |
realtek chipsets and recent airmon-ng version use a new pattern: wlandmon |
here is a bugfix, i use for my version: |
'' |
defset_monitor_thread(self,monitor_card,mac_setting_exists,last_settings): |
#print 'starting new thread' |
status=str(commands.getoutput('airmon-ng start %s'%(monitor_card))) |
#print 'nStatus of airmon-ng start', monitor_card, ':', status,'n' |
if ('monitor mode enabled'instatus) or ('monitor mode vif enabled'instatus): #fix for ralink if |
monitor_interface_process=str(commands.getoutput('airmon-ng')) |
#print 'monitor_interface_process:', monitor_interface_process, 'n' |
if ('monitor mode enabled'instatus): |
regex=re.compile('mond',re.IGNORECASE) |
elif ('monitor mode vif enabled'instatus): |
regex=re.compile('wlandmon',re.IGNORECASE) #changed from mond to wlandmon |
interfaces=regex.findall(monitor_interface_process) |
print'available interfaces:', interfaces |
if(interfaces): |
self.monitor_interface=interfaces[0] |
else: |
self.monitor_interface=monitor_card |
print'setting self.monitor_interface to', self.monitor_interface |
variables.monitor_interface=self.monitor_interface |
self.interface_combo.setEnabled(False) |
variables.wps_functions.monitor_interface=self.monitor_interface |
self.emit(QtCore.SIGNAL('monitor mode enabled')) |
# Create Fake Mac Address and index for use |
mon_down=commands.getstatusoutput('ifconfig %s down'%(self.monitor_interface)) |
ifmac_setting_exists: |
variables.exec_command('macchanger -m %s %s'%(last_settings,self.monitor_interface)) |
else: |
variables.exec_command('macchanger -A %s'%(self.monitor_interface)) |
mon_up=commands.getstatusoutput('ifconfig %s up'%(self.monitor_interface)) |
foriterateinos.listdir('/sys/class/net'): |
ifstr(iterate) str(self.monitor_interface): |
os.chmod('/sys/class/net/'+self.monitor_interface+'/address',0777) |
variables.monitor_mac_address=reader('/sys/class/net/'+self.monitor_interface+'/address').strip() |
variables.wps_functions.monitor_mac_address=variables.monitor_mac_address |
else: |
print'problem occured while setting up the monitor mode of selected', monitor_card |
commented Jan 4, 2015
now intergrated in Fern-Wifi-Cracker 2.1 ( https://code.google.com/p/fern-wifi-cracker/issues/detail?id=97 ) |
Fern Wifi Cracker Stuck Deauthenticating
commented Jan 21, 2015
Hello, I use Kali Linux in VMware Fusion (Mac OS X). When i choose the wlan0 (AWUSO36NH) on fern-wifi, a problem appears ... I'm trying to attack and WPA access. So i think Fern-Wifi Cracker doesn't work well with AWUS036NH. Sorry for my poor english. |