Fern Wifi-cracker provides the GUI for cracking wireless encryption. It comes inbuilt with Kali Linux. Fern Wifi Cracker is a Wireless security auditing and attack software program written using the Python Programming Language and the Python Qt GUI library, the program is able to crack and recover WEP/WPA/WPS keys and also run other network. How to crack wifi Password by Fern WIFI cracker Tool Fern WiFi Cracker is a wireless security auditing and attacking tool written in Python, this tool can crack WPA/WPA2/WEP networks and also can perform MITM attacks Features of Fern WiFi Cracker Tool. WEP cracking; WPA/WPA2 Cracking Dictionary Based Attack, WPS based attack; Automatic Access.
- Fern Wifi Cracker Ubuntu
- Fern Wifi Cracker Mac Address Labels
- Using Fern Wifi Cracker
- Fern Wifi Cracker With Geographical Location Mac Address Tracker
- Fern Wifi Cracker Windows 10
Track Geolocation: Day before yesterday while answering to some of our viewers, around 20% of them asked us about Location Tracking using Kali L. So we thought of making a tutorial in this very interesting topic. In this tutorial, we are going to show you How to Track Geographical location of any device using its Mac Address in Kali.
How To Track Geolocation Of Any Device Using Kali Linux
Now you must be thinking; What is a Mac Address?? MAC stands for Media Access Control, is a unique address of each hardware device. It’s a 48-bit address. Starting 24-bit is assigned by IEEE and last 24-bit is assigned by Manufacturers. Basically, to do this we are using Fern Wifi Cracker. Do tell us your queries in the comment box and we will get back to you ASAP.
Things You Need??
1. PC/Laptop(with Kali Linux Installed)
2. Victim’s mac Address
3. Little Bit Patience
Step 1: Click on the Application Tab that is Located in the upper left of the Desktop
Fern Wifi Cracker Ubuntu
Step 2: After that click on Wireless Attack and then Choose Fern Wifi Cracker.
Step 3: Hope you have successfully Launched “Fern Wifi Cracker”, after that click on “Tool Box”.
Also Read:Full Tutorial Get A Linux Computer Turn Into A Web Server
Fern Wifi Cracker Mac Address Labels
Step 4: Now Click on “Geolocatry Locator” and then Write the mac address in the box and Click on “Track”.
Also Read:Install And Run Kali Linux On Android Smartphone In 2016
Hope You Liked our Article, For More Tech tutorial and News, visit our Site regularly.
'' |
Fern-Wifi-Cracker 2.0 Not working with Ralink Chipsets (tested on AWUS036NH ) |
What steps will reproduce the problem? |
1.start fern-wifi |
2.select interface |
What is the expected output? What do you see instead? |
expected output: 'Monitor mode enabled on wlan0mon' |
instead: stuck in set_monitor_thread() |
What version of the product are you using? On what operating system? |
Linux Mint 64: |
Linux xxxxxxxx 3.13.0-24-generic #47-Ubuntu SMP Fri May 2 23:30:00 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux |
Please provide any additional information below. |
the reason: you only search for monitors with *mon pattern |
realtek chipsets and recent airmon-ng version use a new pattern: wlandmon |
here is a bugfix, i use for my version: |
'' |
defset_monitor_thread(self,monitor_card,mac_setting_exists,last_settings): |
#print 'starting new thread' |
status=str(commands.getoutput('airmon-ng start %s'%(monitor_card))) |
#print 'nStatus of airmon-ng start', monitor_card, ':', status,'n' |
if ('monitor mode enabled'instatus) or ('monitor mode vif enabled'instatus): #fix for ralink if |
monitor_interface_process=str(commands.getoutput('airmon-ng')) |
#print 'monitor_interface_process:', monitor_interface_process, 'n' |
if ('monitor mode enabled'instatus): |
regex=re.compile('mond',re.IGNORECASE) |
elif ('monitor mode vif enabled'instatus): |
regex=re.compile('wlandmon',re.IGNORECASE) #changed from mond to wlandmon |
interfaces=regex.findall(monitor_interface_process) |
print'available interfaces:', interfaces |
if(interfaces): |
self.monitor_interface=interfaces[0] |
else: |
self.monitor_interface=monitor_card |
print'setting self.monitor_interface to', self.monitor_interface |
variables.monitor_interface=self.monitor_interface |
self.interface_combo.setEnabled(False) |
variables.wps_functions.monitor_interface=self.monitor_interface |
self.emit(QtCore.SIGNAL('monitor mode enabled')) |
# Create Fake Mac Address and index for use |
mon_down=commands.getstatusoutput('ifconfig %s down'%(self.monitor_interface)) |
ifmac_setting_exists: |
variables.exec_command('macchanger -m %s %s'%(last_settings,self.monitor_interface)) |
else: |
variables.exec_command('macchanger -A %s'%(self.monitor_interface)) |
mon_up=commands.getstatusoutput('ifconfig %s up'%(self.monitor_interface)) |
foriterateinos.listdir('/sys/class/net'): |
ifstr(iterate) str(self.monitor_interface): |
os.chmod('/sys/class/net/'+self.monitor_interface+'/address',0777) |
variables.monitor_mac_address=reader('/sys/class/net/'+self.monitor_interface+'/address').strip() |
variables.wps_functions.monitor_mac_address=variables.monitor_mac_address |
else: |
print'problem occured while setting up the monitor mode of selected', monitor_card |
commented Jan 4, 2015
now intergrated in Fern-Wifi-Cracker 2.1 ( https://code.google.com/p/fern-wifi-cracker/issues/detail?id=97 ) |
Using Fern Wifi Cracker
commented Jan 21, 2015
Fern Wifi Cracker With Geographical Location Mac Address Tracker
Hello, I use Kali Linux in VMware Fusion (Mac OS X). When i choose the wlan0 (AWUSO36NH) on fern-wifi, a problem appears ... I'm trying to attack and WPA access. So i think Fern-Wifi Cracker doesn't work well with AWUS036NH. Sorry for my poor english. |