Fern Wifi Cracker

In this tutorial, you will learn how to use fern WiFi cracker which is an easy to use graphical WiFi cracking tool which comes pre-installed with Kali Linux. 

If you are looking for the easiest GUI WiFi cracking tool then fern WiFi cracker is the best option to choose. It has been written using python language with the help of Python Qt GUI library. You can use fern WiFi cracker to recover WEP/WPA/WPS keys .

If you don’t have Kali Linux follow these tutorials to install Kali Linux.

Disclaimer: This tutorial has been made for educational purposes only, Geekviews don’t promote malicious practices and will not be responsible for any illegal activities. Use it at your own risk.

How to use fern WiFi cracker to crack Wifi passwords?


Follow these Steps to Crack Wifi password using fern.

Step#1 Choose your WiFi adapter

Start Fern and choose your WiFi adapter in my case it is wlan0.

Fern Wifi Cracker

Also Read: Crack wifi password using Aircrack-ng.

Step#2 Enable XTerms

Click on any blank spot in fern a popup will appear check Enable XTerms and choose OK.

Fern Wifi Cracker

Step#3 Scan for Access Points

Press Scan button to look for WEP & WPA Access points around you.

Fern Wifi Cracker

You can see in my case 4 WPA Access points are detected.

Step#4 Select the Target Access point.

Choose the access point you want to get the password and upload a dictionary file by clicking on the Browse button.

Fern Wifi Cracker

Step#5 Cracking the targeted Access Point

Now you are all set to crack the WiFi password it will take some time for successful handshake capture. Fern WiFi cracker will will De-autheticate all clients connected with the Access point, before it captures the 4-way Handshake.

Fern Wifi CrackerAfter successful 4-way Handshake is captured, Fern will automate brute force with the help of Dictionary file. If all goes well and the access point have a poor combinations of password and it is included in the dictionary file you will get the password.

 

LEAVE A REPLY

Please enter your comment!
Please enter your name here