WEF: WiFi Exploitation Framework

One fully Framework for networks with 802.11 protocols with different attack types for WPA/WPA2 but also WEP, also includes automatic hash cracking, exploitation and many others . Tested on  , Parrot OS , Arch Linux and Ubuntu

web demo

 

Supported Attacks

ballot_box_with_check Deauthentication

ballot_box_with_check Attack

ballot_box_with_check Beacon Flood Attack

ballot_box_with_check PMKID Attack

ballot_box_with_check EvilTwin Attack

ballot_box_with_check Passive/Stealthy Attack

ballot_box_with_check Pixie Dust Attack

ballot_box_with_check Null Pin Attack

ballot_box_with_check Chopchop Attack

ballot_box_with_check Replay Attack

ballot_box_with_check Michael Exploitation Attack

ballot_box_with_check Caffe-Latte Attack

ballot_box_with_check Jamming, Reading and Writing bluetooth connections

ballot_box_with_check GPS Spoofing with HackRF

 

Specifications

ballot_box_with_check Log generator

ballot_box_with_check WPA/WPA2, WPS and WEP Attacks

ballot_box_with_check Auto handshake cracking

ballot_box_with_check Multiple templates for EvilTwin attack

ballot_box_with_check Check monitor mode and its status

ballot_box_with_check 2Ghz and 5Ghz attacks

ballot_box_with_check wordlist selector

ballot_box_with_check Auto detect requirements

ballot_box_with_check Bluetooth support (Jamming, Reading, Writing)

Use

wef -i wlan0 # Το  μπορεί να είναι διαφορετικό
ή
wef --interface wlan0

Απαιτήσεις Συστήματος

aircrack-ng
reaver
mdk4
macchanger
hashcat
xterm
hcxtools
pixiewps
python3
btlejack
crackle
php
hostadp
dnsmasq

Εγκατάσταση

git clone https://github.com/D3Ext/WEF
cd WEF
bash setup.sh

ή

git clone https://github.com/D3Ext/WEF && cd WEF && bash setup.sh

Μπορείτε να κατεβάσετε το πρόγραμμα από εδώ.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.100 registrants.
exploitation framework, wifi, iguru

Written by Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

2 Comments

Leave a Reply
  1. Could you make a more detailed guide with the specific program? Some examples of alleged attacks (authentication attack, evil twin attack, etc.). What is mentioned in the article is the same as the creator's page from Github

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).