Fern Wifi Cracker Osx

Posted on  by 



Fern Wifi Cracker is a Wireless security auditing and attack software program written using the Python Programming Language and the Python Qt GUI library, the program is able to crack and recover WEP/WPA/WPS keys and also run other network based attacks on wireless or ethernet based networks. Fern WiFi cracker is GUI based tool to crack wireless encryption. It comes preinstalled with Kali Linux. How to hack wifi Password using Fern WiFi Cracker. First of all you need to install Kali Linux either in Virtual Box or as a main operating system. Alternatively you can use Kali Linux Live. Wifi WEP WPA Fern Pro Fern Wifi Audit Wifi Linux WPS DHCP DNS SERVER. Sudo apt-get install fern-wifi-cracker Which will install fern-wifi-cracker and any other packages on which it depends.

  1. Fern Wifi Cracker Stuck Deauthenticating
  2. Using Fern Wifi Cracker
Fern Wifi Cracker OsxOsxFern
Fix Fern Wifi for Alfa AWUS036NH / wlan*mon pattern
gistfile1.py
''
Fern-Wifi-Cracker 2.0 Not working with Ralink Chipsets (tested on AWUS036NH )
What steps will reproduce the problem?
1.start fern-wifi
2.select interface
What is the expected output? What do you see instead?
expected output: 'Monitor mode enabled on wlan0mon'
instead: stuck in set_monitor_thread()
What version of the product are you using? On what operating system?
Linux Mint 64:
Linux xxxxxxxx 3.13.0-24-generic #47-Ubuntu SMP Fri May 2 23:30:00 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux
Please provide any additional information below.
the reason: you only search for monitors with *mon pattern
realtek chipsets and recent airmon-ng version use a new pattern: wlandmon
here is a bugfix, i use for my version:
''
defset_monitor_thread(self,monitor_card,mac_setting_exists,last_settings):
#print 'starting new thread'
status=str(commands.getoutput('airmon-ng start %s'%(monitor_card)))
#print 'nStatus of airmon-ng start', monitor_card, ':', status,'n'
if ('monitor mode enabled'instatus) or ('monitor mode vif enabled'instatus): #fix for ralink if
monitor_interface_process=str(commands.getoutput('airmon-ng'))
#print 'monitor_interface_process:', monitor_interface_process, 'n'
if ('monitor mode enabled'instatus):
regex=re.compile('mond',re.IGNORECASE)
elif ('monitor mode vif enabled'instatus):
regex=re.compile('wlandmon',re.IGNORECASE) #changed from mond to wlandmon
interfaces=regex.findall(monitor_interface_process)
print'available interfaces:', interfaces
if(interfaces):
self.monitor_interface=interfaces[0]
else:
self.monitor_interface=monitor_card
print'setting self.monitor_interface to', self.monitor_interface
variables.monitor_interface=self.monitor_interface
self.interface_combo.setEnabled(False)
variables.wps_functions.monitor_interface=self.monitor_interface
self.emit(QtCore.SIGNAL('monitor mode enabled'))
# Create Fake Mac Address and index for use
mon_down=commands.getstatusoutput('ifconfig %s down'%(self.monitor_interface))
ifmac_setting_exists:
variables.exec_command('macchanger -m %s %s'%(last_settings,self.monitor_interface))
else:
variables.exec_command('macchanger -A %s'%(self.monitor_interface))
mon_up=commands.getstatusoutput('ifconfig %s up'%(self.monitor_interface))
foriterateinos.listdir('/sys/class/net'):
ifstr(iterate) str(self.monitor_interface):
os.chmod('/sys/class/net/'+self.monitor_interface+'/address',0777)
variables.monitor_mac_address=reader('/sys/class/net/'+self.monitor_interface+'/address').strip()
variables.wps_functions.monitor_mac_address=variables.monitor_mac_address
else:
print'problem occured while setting up the monitor mode of selected', monitor_card

commented Jan 4, 2015

now intergrated in Fern-Wifi-Cracker 2.1 ( https://code.google.com/p/fern-wifi-cracker/issues/detail?id=97 )

Fern Wifi Cracker Stuck Deauthenticating

Fern wifi cracker github

commented Jan 21, 2015

Fern Wifi Cracker Osx

Hello,

I use Kali Linux in VMware Fusion (Mac OS X).
Linux secu 3.14-kali1-amd64 #1 SMP Debian 3.14.5-1kali1 (2014-06-07) x86_64 GNU/Linu
Device: AWUSI36NH

When i choose the wlan0 (AWUSO36NH) on fern-wifi, a problem appears ...

I'm trying to attack and WPA access.
I plug the device, i run in CLI airmon and airodump on the BSSID... i see stations, get Handshake etc...
When i run Fern-Wifi-Cracker 2.1, it sees AP but it can't get MAC to run the classic attack. When i kill fern-wifi cracker and re test airodump, it doesn't see station.. nothing appears. Unplug and replug device and airodump works again.

So i think Fern-Wifi Cracker doesn't work well with AWUS036NH.

Sorry for my poor english.

Using Fern Wifi Cracker

Sign up for freeto join this conversation on GitHub. Already have an account? Sign in to comment




Coments are closed