Top Related Projects
The Rogue Access Point Framework
This is a multi-use bash script for Linux systems to audit wireless networks.
Rewrite of the popular wireless network auditor, "wifite"
Fluxion is a remake of linset by vk496 with enhanced functionality.
Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.
DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3
Quick Overview
Fern WiFi Cracker is an open-source wireless security auditing and attack software tool. It is designed to test the security of wireless networks by attempting to crack WEP/WPA/WPS keys and can also be used for other wireless-related attacks.
Pros
- User-friendly graphical interface for ease of use
- Supports various wireless attack methods (WEP, WPA, WPS)
- Includes additional features like MAC address changing and network scanning
- Compatible with multiple wireless adapters
Cons
- Potential for misuse in unauthorized network penetration
- May require specific wireless adapters for full functionality
- Limited to WiFi security testing, not a comprehensive security suite
- Requires root/administrator privileges, which may pose security risks
Getting Started
To get started with Fern WiFi Cracker:
-
Clone the repository:
git clone https://github.com/savio-code/fern-wifi-cracker.git
-
Install dependencies:
sudo apt-get install python-qt4 python-scapy aircrack-ng xterm
-
Run the tool:
cd fern-wifi-cracker sudo python execute.py
Note: This tool should only be used for ethical, authorized testing purposes. Ensure you have permission before testing any network that you do not own or manage.
Competitor Comparisons
The Rogue Access Point Framework
Pros of Wifiphisher
- More advanced phishing capabilities with customizable templates
- Supports Evil Twin attacks and can create rogue access points
- Active development with regular updates and bug fixes
Cons of Wifiphisher
- Steeper learning curve for beginners
- Requires more system resources to run effectively
- Limited GUI options, primarily command-line based
Code Comparison
Fern-wifi-cracker (Python):
from PyQt4 import QtCore, QtGui
import os
class Fern_Main_Window(QtGui.QMainWindow):
def __init__(self):
QtGui.QMainWindow.__init__(self)
self.setupUi(self)
Wifiphisher (Python):
from scapy.all import *
import os
import sys
def set_ip_fwd():
os.system('echo "1" > /proc/sys/net/ipv4/ip_forward')
Both projects use Python, but Fern-wifi-cracker relies on PyQt4 for its GUI, while Wifiphisher focuses on command-line functionality using libraries like Scapy for network manipulation. Wifiphisher's code tends to be more focused on low-level network operations, while Fern-wifi-cracker includes more GUI-related code.
This is a multi-use bash script for Linux systems to audit wireless networks.
Pros of airgeddon
- More actively maintained with frequent updates
- Supports a wider range of wireless attacks and tools
- Offers a more comprehensive and user-friendly interface
Cons of airgeddon
- Steeper learning curve due to more complex features
- Requires more system resources to run effectively
- May be overwhelming for beginners in wireless security testing
Code Comparison
fern-wifi-cracker:
def scan_network(self):
self.wps_functions.stop_wps_attack()
self.disconnect_attack()
self.scan_control = True
thread.start_new_thread(self.scan_loop,())
airgeddon:
function set_interface_mode() {
if [ "$1" = "monitor" ]; then
${airmon} start "${interface}" >/dev/null 2>&1
elif [ "$1" = "managed" ]; then
${airmon} stop "${interface}" >/dev/null 2>&1
fi
}
Both projects aim to provide wireless network auditing tools, but they differ in their approach and implementation. fern-wifi-cracker is written in Python and offers a graphical interface, while airgeddon is a bash script with a text-based menu system. airgeddon generally provides more features and is more actively maintained, but may be more challenging for newcomers to use effectively.
Rewrite of the popular wireless network auditor, "wifite"
Pros of wifite2
- More actively maintained with frequent updates
- Supports a wider range of attack methods and tools
- Better command-line interface and automation capabilities
Cons of wifite2
- Lacks a graphical user interface, which may be less user-friendly for beginners
- Requires more manual configuration and setup compared to Fern WiFi Cracker
Code Comparison
Fern WiFi Cracker (Python):
from core import *
from gui import *
class MainWindow(QMainWindow,Ui_Dialog):
def __init__(self):
QMainWindow.__init__(self)
self.setupUi(self)
wifite2 (Python):
from .config import Configuration
from .util.color import Color
def entry_point():
try:
Configuration.initialize(load_interface=False)
Both projects are written in Python, but wifite2 has a more modular structure and focuses on command-line functionality, while Fern WiFi Cracker includes a GUI component.
wifite2 is generally considered more powerful and flexible for advanced users, while Fern WiFi Cracker may be easier for beginners due to its graphical interface. However, wifite2's active development and broader feature set make it a more comprehensive tool for WiFi security testing.
Fluxion is a remake of linset by vk496 with enhanced functionality.
Pros of Fluxion
- More active development with recent updates and contributions
- Supports a wider range of attack vectors and techniques
- Better documentation and user guides
Cons of Fluxion
- More complex setup and configuration process
- Requires more dependencies and system resources
- May be less stable due to frequent updates and changes
Code Comparison
Fern-wifi-cracker:
def scan_network():
interface = get_network_interface()
networks = subprocess.check_output(["iwlist", interface, "scan"])
return parse_networks(networks)
Fluxion:
function scan_for_targets() {
xterm -hold -e airodump-ng $WIRELESS_IFACE &
airodump_pid=$!
sleep 10
kill $airodump_pid
}
The code snippets show different approaches to network scanning. Fern-wifi-cracker uses Python and system commands, while Fluxion utilizes bash scripting and specialized tools like airodump-ng.
Both projects aim to assess Wi-Fi security, but Fluxion offers more advanced features and attack methods. Fern-wifi-cracker is simpler to use and may be more suitable for beginners or quick assessments. Fluxion provides a more comprehensive toolkit for experienced users but requires more setup and knowledge to use effectively.
Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.
Pros of eaphammer
- More focused on enterprise Wi-Fi attacks, particularly against WPA2-Enterprise networks
- Includes advanced features like hostile portal attacks and indirect wireless pivots
- Actively maintained with regular updates and improvements
Cons of eaphammer
- Steeper learning curve due to its more specialized nature
- Less user-friendly interface compared to Fern WiFi Cracker's GUI
- Requires more manual configuration and command-line usage
Code Comparison
eaphammer uses a modular approach with separate Python scripts for different functionalities:
from core.utils import *
from core.handlers.ap_handler import APHandler
from core.handlers.db_handler import DBHandler
Fern WiFi Cracker employs a more monolithic structure with a GUI-centric design:
from gui.main_window import *
from core.fern import *
from core.tools import *
Both projects utilize Python, but eaphammer's code structure is more oriented towards advanced users and security professionals, while Fern WiFi Cracker aims for broader accessibility.
eaphammer's focus on enterprise Wi-Fi attacks and advanced features makes it a powerful tool for security professionals and penetration testers. However, Fern WiFi Cracker's user-friendly GUI and broader range of basic Wi-Fi cracking tools make it more suitable for beginners and general-purpose Wi-Fi security testing.
DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3
Pros of WiFi-Pumpkin-deprecated
- More comprehensive suite of tools for wireless network attacks and analysis
- Includes features like captive portal creation and DNS spoofing
- Active development with more recent updates
Cons of WiFi-Pumpkin-deprecated
- Steeper learning curve due to more complex features
- Requires more system resources to run effectively
- Some users report stability issues with certain modules
Code Comparison
Fern-Wifi-Cracker:
def wep_crack_launcher(self):
variables.exec_command = 'aircrack-ng -a 1 %s' % (variables.temp_capture)
variables.exec_command += ' -l ' + variables.wep_key_filename
subprocess.Popen(variables.exec_command,shell=True,stdout=subprocess.PIPE,stderr=subprocess.PIPE)
WiFi-Pumpkin-deprecated:
def getAccessPointSettings(self):
self.confgSetting = {}
for i in self.ListRules.keys():
self.confgSetting[i] = []
for config in self.ListRules[i]:
self.confgSetting[i].append(config.currentText())
return self.confgSetting
Both projects use Python for their core functionality, but WiFi-Pumpkin-deprecated appears to have a more complex structure with additional features and configurations. Fern-Wifi-Cracker focuses more on specific cracking tasks, while WiFi-Pumpkin-deprecated offers a broader range of network manipulation tools.
Convert designs to code with AI
Introducing Visual Copilot: A new AI model to turn Figma designs to high quality code using your components.
Try Visual CopilotREADME
Fern Wifi Cracker
Fern Wifi Cracker is a Wireless security auditing and attack software program written using the Python Programming Language and the Python Qt GUI library. The program is able to crack and recover WEP/WPA/WPS keys and also run other network based attacks on wireless or ethernet based networks
DISCLAIMER
Fern-Wifi-Cracker is designed to be used in testing and discovering flaws in one's own network with the aim of fixing the flaws detected, DO NOT use the program on networks for which you don't have permission, I am not responsible for whatever damage you cause by using this software.
Visit http://www.fern-pro.com for professional version
Supported operating systems
The Software runs on any Linux machine with the programs prerequisites. The program has been tested to work on the following Linux based operating systems:
Prerequisites
The following dependencies can be installed using the Debian package installer command on Debian based systems using apt-get install <program>
or otherwise downloaded and installed manually
- Aircrack-NG
- Python 3.x
- Python-Scapy
- Python Qt5
- Subversion
- Xterm
- Reaver (for WPS Attacks)
- Macchanger
Features
Fern Wifi Cracker currently supports the following features:
- WEP Cracking with Fragmentation,Chop-Chop, Caffe-Latte, Hirte, ARP Request Replay or WPS attack
- WPA/WPA2 Cracking with Dictionary or WPS based attacks
- Automatic saving of key in database on successful crack
- Automatic Access Point Attack System
- Session Hijacking (Passive and Ethernet Modes)
- Access Point MAC Address Geo Location Tracking
- Internal MITM Engine
- Bruteforce Attacks (HTTP,HTTPS,TELNET,FTP)
- Update Support
Running Program
root@host:~# python3 execute.py
The source code for the program can be fetched using the following command on terminal:
root@host:~# git clone https://github.com/savio-code/fern-wifi-cracker.git
Upgrading and Updating
The Program automatically checks for updates each time the program is ran, if the program finds an update, it notifies user with the message New Update is Available, in other to update all you simply have to do is click on the update button When the button is clicked, allow to download update files until it displays the message Please Restart Application
Screenshots
Main Window
WPA Cracking with WPS Attack
Cookie highjacking
Other Projects
https://github.com/savio-code/ghost-phisher
https://github.com/savio-code/hexorbase
Supporting
If you like Fern Wifi Cracker and would like to support the development, please do so using bitcoin: 1AoBfNLfwDrw4ofZXZVm9YfeaFCXtG9k9B
Top Related Projects
The Rogue Access Point Framework
This is a multi-use bash script for Linux systems to audit wireless networks.
Rewrite of the popular wireless network auditor, "wifite"
Fluxion is a remake of linset by vk496 with enhanced functionality.
Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.
DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3
Convert designs to code with AI
Introducing Visual Copilot: A new AI model to turn Figma designs to high quality code using your components.
Try Visual Copilot