Hacking Book | Free Online Hacking Learning

Home

top 10 excellent wifi penetration tools in kali linux

Posted by verstraete at 2020-02-27
all

This article is going to discuss a very hot topic at present: how to infiltrate the wireless network and how to prevent it from being invaded. WiFi is usually a weak link in the network environment, because WiFi signals can be captured by anyone anywhere in the range, and as long as there are correct tools and appropriate software (such as Kali Linux), many security vulnerabilities in wireless routers can be easily exploited by attackers.

Next, we will introduce the top 10 most popular WiFi intrusion tools, which can help us test the potential security problems in the wireless network environment.

1.   Aircrack-ng

Official website: [portal]

Tutorial: Portal

brief introduction

Airtrack is currently the most popular tool in the field of WEP / WPA / WPA2 cracking. The tools included in airtrack ng suite can capture data packets and handshake packets, generate communication data, or carry out violent cracking attacks and dictionary attacks. Airtrack ng is a multi in one integration kit, which includes the following tools:

-Airtrack ng: wireless password cracking

-Airplay: generate network data and go to the client for verification

-Airdump ng: packet capture

-Airbase ng: configure fake access points

Airtrack ng can run on Linux, windows and Mac OS, and kalilinux comes with the package by default. If you are going to use this tool, you also need to make sure that your wireless card has packet injection capabilities.

2.   Reaver

Official website: [portal]

Tutorial: Portal

brief introduction

The second most popular attack tool is Reaver, which mainly aims at WPS vulnerabilities. Reaver will brutally crack the registered pin code of WiFi protection setting (WPS) and try to recover the WPA / WPA2 password. Because many router manufacturers and ISPs will turn on WPS by default, many routers on the market cannot resist this attack.

The signal of the wireless router must be strong enough when using the Reaver. On average, the Reaver can crack the target router's password within 4-10 hours, and the specific cracking time should be determined according to the access point type, signal strength and pin code itself. From the perspective of probability theory and statistics, you have a 50% chance to crack the pin code of the target router in half the time.

3.   Pixiewps

Official website: [portal]

Tutorial: Portal

Revised River + Pixie: [portal]

brief introduction

Pixiewps is a new penetration tool for WPS vulnerabilities added by Kali Linux. Pixiewps is developed in C language and can be used to explode WPS pin code offline. The technology it uses is called pixie dust attack. It should be noted that Pixie WPS requires a modified version of realer or WiFi to work properly. As this tool has become very popular in a short time, it ranks third on our list.

4.   Wifite

Official website: [portal]

brief introduction

WiFi is an automatic tool that can attack multiple wireless encryption methods (WEP / WPA / WPA2 and WPS). WiFi needs to provide several parameters before running, and WiFi will automatically help us complete all tasks. It can capture the WPA handshake packet, automatically verify the client, cheat the MAC address, and crack the WiFi password.

5.   Wireshark

Official website: [portal]

Tutorial: Portal

Online courses: [wiresharkcrash course], [wiresharktutorial – get Wireshark certification]

brief introduction

Wireshark is the best network protocol analysis tool at present. With the help of Wireshark, you can analyze a network in depth and get as much information as possible. Wireshark can capture network packets, analyze hundreds of protocols, browse and filter packets in real time. Note that Wireshark is a cross platform tool.

Kali Linux comes with Wireshark by default, but it can be used by both windows and Mac OS users. If you want to use some special features of Wireshark, you need a WiFi adapter that supports listening mode.

6.   oclHashcat

Official website: [portal]

Tutorial: Portal

brief introduction

Oclhashcat is not a dedicated WiFi intrusion tool, and it is not a tool of Kali Linux, but it can carry out high-speed explosion attack and dictionary attack (using GPU to run Dictionary) on the captured handshake packet. After using airtrack ng or other tools to capture the handshake package, we can use GPU and oclhashcat to crack the WiFi password, and GPU + oclhashcat is much faster than CPU + airtrack ng.

Oclhashcat is available for windows and Linux, as well as for AMD and NVIDIA video cards.

7.   Fern Wifi Cracker

Official website: [portal]

brief introduction

Fern WiFi cracker is a security audit tool and attack tool for wireless networks, which is written in Python. It is also the only tool with graphical user interface among the top ten wireless attack tools. Fern WiFi cracker can crack WEP, WPA and WPS keys, and also contains components that can perform mitm (man in the middle attack) attacks.

8. Wash

Official website: [portal]

Tutorial: Portal

brief introduction

When the attacker is brutally attacking the WPS pin code, many access points will lock themselves to ensure the security of the router. And wash is a tool that can determine whether the target access point has turned on WPS. After many attempts using the realer, you can use wash to check whether the access point has locked the WPS.

9.   Crunch

Official website: [portal]

Tutorial: Portal

brief introduction

Crunch can be used to generate custom dictionaries, while the generated dictionaries can be used for dictionary attacks. Because the success rate of dictionary attack depends on the quality of the dictionary used, it is inevitable for us to generate a dictionary according to our own needs.

10.  Macchanger

Official website: [portal]

Tutorial: Portal

brief introduction

In fact, macchanger is a gadget that can change the MAC address of your device to a random value. Of course, you can also change it to the data you want. In order to avoid MAC address filtering used by the target device, MAC address modification is very important for WiFi attacks.

summary

I hope that the top ten popular WiFi attack tools summarized in this paper can help you to some extent. In the current situation, the security of wireless network still has a lot of room to improve, and the improvement of this security needs the whole community to contribute their own strength.

*Reference source: hackingtutorials, compiled by FB editor alpha ﹤ h4ck, reprinted from freebuf.com