Wireless Attackswificrackerwepwpawpswirelessauditingpython

Fern Wifi Cracker

Automated Wi-Fi cracker for recovering WEP/WPA/WPS keys. Performs wireless security auditing and network-based attacks on wireless or ethernet networks.

Description

Fern Wifi Cracker is a Wireless security auditing and attack software program written using the Python Programming Language and the Python Qt GUI library. The program is able to crack and recover WEP/WPA/WPS keys and also run other network based attacks on wireless or ethernet based networks.

It serves as an automated tool for Wi-Fi security assessment, enabling users to perform penetration testing on wireless networks. The GUI interface simplifies the process of launching attacks and recovering encryption keys.

This tool is particularly useful for security professionals conducting authorized audits to identify weaknesses in Wi-Fi configurations.

How It Works

Fern Wifi Cracker leverages Python and Python Qt GUI for its interface, integrating with dependencies like aircrack-ng for packet capture and cracking, reaver for WPS attacks, scapy for packet manipulation, and macchanger for MAC spoofing. It automates techniques to capture handshakes, perform dictionary attacks, or exploit WPS vulnerabilities to recover WEP/WPA/WPS keys, and supports additional network attacks via xterm integration.

Installation

bash
sudo apt install fern-wifi-cracker

Examples

Launches the Fern Wifi Cracker GUI application
fern-wifi-cracker
Runs the tool with elevated privileges required for wireless interfaces
sudo fern-wifi-cracker
Starts the cracker specifying wireless interface wlan0 (inferred GUI usage)
fern-wifi-cracker -i wlan0
Launches Fern in xterm terminal emulator as per dependency
xterm -e fern-wifi-cracker
Randomizes MAC address then launches Fern for anonymous auditing
macchanger -r wlan0 && fern-wifi-cracker
Puts interface in monitor mode using aircrack-ng then launches Fern
airmon-ng start wlan0 && fern-wifi-cracker
Updated 2026-04-16kali.org ↗