Fern Wifi Cracker!

The Program requires the following to run properly: The following dependencies can be installed using the _Debian package installer_ command on Debian based systems using apt-get install program or otherwise downloaded and installed manually 1 . Aircrack-NG http://www.aircrack-ng.org/
2 . Python-Scapy http://www.secdev.org/projects/scapy/

Fern Wifi Cracker alternatives

  • Aircrack-ng

  • Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attack, thus making the attack much faster compared to other WEP cracking tools.

    tags: cracking hacking password-recovery recover-wireless-keys
  • Wifite

  • To attack multiple WEP, WPA, and WPS encrypted networks in a row. This tool is customizable to be automated with only a few arguments. Wifite aims to be the "set it and forget it" wireless auditing tool.

    tags: menu-bar-app security-auditing wep wifi-signal-measurement wpa
  • cSploit

  • The most complete and advanced IT security professional toolkit on Android.

    tags: Root security-and-privacy security-utilities passwords security-auditing
  • Pyrit

  • Pyrit allows to create massive databases, pre-computing part of the IEEE 802.11 WPA/WPA2-PSK authentication phase in a space-time-tradeoff. Exploiting the computational power of Many-Core- and other platforms through ATI-Stream, Nvidia CUDA, OpenCL and VIA Padlock, it is currently by far the most powerful attack against one of the world’s most used security-protocols.

    tags: cracking cuda gpu hacking opencl
  • reaver

  • Reaver implements a brute force attack against Wifi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases. Reaver has been designed to be a robust and practical attack against WPS, and has been tested against a wide variety of access points and WPS implementations. On average Reaver will recover the target AP's plain text WPA/WPA2 passphrase in 4-10 hours, depending on the AP. In practice, it will generally take half this time to guess the correct WPS pin and recover the passphrase. »

    tags: network-scanner network-security network-utility bruteforce