Hacking For Babies
  • Introduction
  • Ethical Hacking
  • Kali Linux
    • Why Kali ?
    • Virtual Machine
    • kali on Cloud
    • Bootable USB
    • Dual Boot Kali
    • Kali Nethunter
    • Most Used Linux Commands
    • Additional Information
  • Network Basics
    • What is the internet ?
    • Key Words
    • Network devices
    • LAN / WAN
    • VPN (Virtual Private Network)
    • Deep and Dark Web
    • Networking Commands
    • Additional Information
  • OSINT
    • Maltego
    • Google Advanced Search Operators
    • OSINT Username Finder
    • Social Media OSINT
    • Reverse Image Search
    • Protect yourself from OSINT
    • Additional Information
  • Digital Forensics
  • Phishing Attacks
    • Temporary Numbers
    • GitHub Projects/Tools
    • Kali Pre-Installed Tools
    • Emails Tricks
    • How to secure yourself from phishing attacks
    • Additional Information
  • Hardware Attacks
    • Marketplaces and Websites
    • Keylogger
    • USB Killer
    • Ethernet Hacking Tools
    • Flipper Zero
    • Bad USB
  • HID Attacks
    • Classic Bad USB
    • Wireless Bad USB
    • Keystroke Injection Cable
    • Other Tools Using the Some Concept
    • Simple Ducky Script
    • Reverse Shell Ducky Script
    • Solution for Bad USB
  • Cryptography
    • What is Cryptography ?
    • Simple Cryptography Algorithms
    • Hash Algorithms
    • Symmetric / Asymmetric cryptography
    • RSA Cryptosystem
    • Quantum Computers VS Cryptography
    • Steganography: Hiding Data in music and photos
    • Additional Information
  • Password Attacks
    • Dictionary Attacks
    • Brute Force Attacks
    • Hashcat
    • Hydra
    • Other Password Attacks Tools
    • Protect your Self against Password Attacks
  • Wireless Attacks
    • RFID / NFC Attacks
    • Bluetooth Attacks
    • MouseJack Attacks
    • IR Replay Attacks
    • RF Attacks
    • Wifi Attacks
  • WIFI Attacks
    • Wireless Adapters
    • Basic WIFI Manipulation
    • Deauthentication Attack
    • WIFI Cracking
    • MITM Attacks
    • Prebuild WIFI Pentesting Tools
    • WIFI Attack Solution
    • Additional Information
  • WIFI Cracking
    • WEP Cracking
    • WPS Attack
    • WPA Handshake Capture
    • PMKID Hash Capture
    • Hashcat Cracking
    • Wifite
    • Airgeddon
    • Fern WIFI Cracker
    • Protecting your Wi-Fi network from cracking
  • Coming Soon
Powered by GitBook
On this page
  • Overview
  • How to use It?
  1. WIFI Cracking

Fern WIFI Cracker

PreviousAirgeddonNextProtecting your Wi-Fi network from cracking

Last updated 1 year ago

Overview

Fern WiFi Cracker is a wireless security auditing tool designed for testing the security of Wi-Fi networks. It provides a graphical user interface (GUI) that simplifies the process of cracking WEP and WPA/WPA2-PSK passwords. Fern WiFi Cracker utilizes various attack methods, including brute-force, dictionary, and WPS attacks, to exploit vulnerabilities in Wi-Fi security protocols. With its user-friendly interface and powerful capabilities, Fern WiFi Cracker enables security professionals and ethical hackers to assess the strength of Wi-Fi network security and identify potential vulnerabilities. However, it's important to note that using such tools should only be done with proper authorization and in accordance with the law and ethical guidelines.

This package contains a Wireless security auditing and attack software program written using the Python Programming Language and the Python Qt GUI library, the program is able to crack and recover WEP/WPA/WPS keys and also run other network based attacks on wireless or ethernet based networks.

How to use It?

You can check those YouTube Videos/Tutorials about Fern WIFI Cracker

created by

created by

This YouTube Video
David Bombal
This YouTube Video
World Gurukul way of Learning Values and Wisdom
Logofern-wifi-cracker | Kali Linux ToolsKali Linux
LogoGitHub - savio-code/fern-wifi-cracker: Automatically exported from code.google.com/p/fern-wifi-crackerGitHub
Fern Pro | Penetration Testing