Fern Wifi Cracker Mac Address

Mac address was stolen by hacker/cracker from wifi/wireless along with other information. I am in the process of installing and connecting through another connection for my office. The wireless feature has been removed from the modem and will be disabled from the get go. How to crack wifi Password by Fern WIFI cracker Tool Fern WiFi Cracker is a wireless security auditing and attacking tool written in Python, this tool can crack WPA/WPA2/WEP networks and also can perform MITM attacks Features of Fern WiFi Cracker Tool. WEP cracking; WPA/WPA2 Cracking Dictionary Based Attack, WPS based attack; Automatic Access.

Fern wifi cracker mac address free
Fix Fern Wifi for Alfa AWUS036NH / wlan*mon pattern
gistfile1.py

Today i am going to Show you How to track any MAC-address Geographical Location using kali linux. This trick is helful in finding lost devices. Open Applications kali linux wireless Tools 802.11 Wireless Tools Fern-wifi-crecker. KisMAC is a wireless stumbler and cracker that can perform a number of WiFi related tasks directly from your Mac’s operating system. WEP keys are compromised by a process known as WEP injection where data packets are used to determine the password. Access Point MAC Address Geo Location Tracking; Internal MITM Engine; Bruteforce Attacks (HTTP,HTTPS,TELNET,FTP) Update Support; Fern Wifi Cracker Installation. Installation Debian Package supported systems: root@host:# dpkg -i Fern-Wifi-Cracker1.6all.deb. The source code for the program can be fetched using the following command on terminal.

''
Fern-Wifi-Cracker 2.0 Not working with Ralink Chipsets (tested on AWUS036NH )
What steps will reproduce the problem?
1.start fern-wifi
2.select interface
What is the expected output? What do you see instead?
expected output: 'Monitor mode enabled on wlan0mon'
instead: stuck in set_monitor_thread()
What version of the product are you using? On what operating system?
Linux Mint 64:
Linux xxxxxxxx 3.13.0-24-generic #47-Ubuntu SMP Fri May 2 23:30:00 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux
Please provide any additional information below.
the reason: you only search for monitors with *mon pattern
realtek chipsets and recent airmon-ng version use a new pattern: wlandmon
here is a bugfix, i use for my version:
''
defset_monitor_thread(self,monitor_card,mac_setting_exists,last_settings):
#print 'starting new thread'
status=str(commands.getoutput('airmon-ng start %s'%(monitor_card)))
#print 'nStatus of airmon-ng start', monitor_card, ':', status,'n'
if ('monitor mode enabled'instatus) or ('monitor mode vif enabled'instatus): #fix for ralink if
monitor_interface_process=str(commands.getoutput('airmon-ng'))
#print 'monitor_interface_process:', monitor_interface_process, 'n'
if ('monitor mode enabled'instatus):
regex=re.compile('mond',re.IGNORECASE)
elif ('monitor mode vif enabled'instatus):
regex=re.compile('wlandmon',re.IGNORECASE) #changed from mond to wlandmon
interfaces=regex.findall(monitor_interface_process)
print'available interfaces:', interfaces
if(interfaces):
self.monitor_interface=interfaces[0]
else:
self.monitor_interface=monitor_card
print'setting self.monitor_interface to', self.monitor_interface
variables.monitor_interface=self.monitor_interface
self.interface_combo.setEnabled(False)
variables.wps_functions.monitor_interface=self.monitor_interface
self.emit(QtCore.SIGNAL('monitor mode enabled'))
# Create Fake Mac Address and index for use
mon_down=commands.getstatusoutput('ifconfig %s down'%(self.monitor_interface))
ifmac_setting_exists:
variables.exec_command('macchanger -m %s %s'%(last_settings,self.monitor_interface))
else:
variables.exec_command('macchanger -A %s'%(self.monitor_interface))
mon_up=commands.getstatusoutput('ifconfig %s up'%(self.monitor_interface))
foriterateinos.listdir('/sys/class/net'):
ifstr(iterate) str(self.monitor_interface):
os.chmod('/sys/class/net/'+self.monitor_interface+'/address',0777)
variables.monitor_mac_address=reader('/sys/class/net/'+self.monitor_interface+'/address').strip()
variables.wps_functions.monitor_mac_address=variables.monitor_mac_address
else:
print'problem occured while setting up the monitor mode of selected', monitor_card

commented Jan 4, 2015

now intergrated in Fern-Wifi-Cracker 2.1 ( https://code.google.com/p/fern-wifi-cracker/issues/detail?id=97 )

commented Jan 21, 2015

Hello,

I use Kali Linux in VMware Fusion (Mac OS X).
Linux secu 3.14-kali1-amd64 #1 SMP Debian 3.14.5-1kali1 (2014-06-07) x86_64 GNU/Linu
Device: AWUSI36NH

When i choose the wlan0 (AWUSO36NH) on fern-wifi, a problem appears ...

I'm trying to attack and WPA access.
I plug the device, i run in CLI airmon and airodump on the BSSID... i see stations, get Handshake etc...
When i run Fern-Wifi-Cracker 2.1, it sees AP but it can't get MAC to run the classic attack. When i kill fern-wifi cracker and re test airodump, it doesn't see station.. nothing appears. Unplug and replug device and airodump works again.

So i think Fern-Wifi Cracker doesn't work well with AWUS036NH.

Sorry for my poor english.

Sign up for freeto join this conversation on GitHub. Already have an account? Sign in to comment

Some of the codes might not work in your Smart Phones …..

Finder

******* Use at your own risk!!!!!
——————————————————————————————————————–
*#*#4636#*#* Information about phone and batteries
*#*#7780#*#* Reset data like before
*2767*3855# Format Phone

*#*#197328640#*#* Launch service mode

*#*#232339#*#* Test WiFi

*#*#197328640#*#* Log mode service

*#*#1472365#*#* GPS test
*#*#1575#*#* Other GPS test
*#*#232331#*#* Bluetooth test
*#*#232337#*# Displays Bluetooth address
*#*#0*#*#* LCD test
*#*#0673#*#* Melody test
*#*#0842#*#* Device tests
*#*#2663#*#* Touchscreen version
*#*#2664#*#* Touchscreen test
*#*#0588#*# * Proximity sensor test
*#*#3264#*#* RAM version
*2767*3855# Factory reset

General Codes:

*#06# –Display’s IMEI number.
*2767*3855# –Format your device to factory state (will delete everything on phone).
*#*#4636#*#* – Display’s Phone information, usage statistics and battery.
*#*#273282*255*663282*#*#* –Immediately backup of all media files.
*#*#197328640#*#* –Enable test mode for service.
*#*#1111#*#* –Displays FTA software version.
*#*#1234#*#* –Shows PDA and firmware version.
*#*#232339#*#* – Wireless LAN tests.
*#*#0842#*#* –Backlight/vibration test.
*#12580*369# – Displays Software and hardware info.
*#*#2664#*#* – Testing the touchscreen.
*#9900# – System dump mode.
*#9090# – Diagnostic configuration.
*#*#34971539#*#* –Displays Detailed camera information.
*#872564# – USB logging control.
*#301279# – HSDPA/HSUPA Control Menu.
*#7465625# –Display phone’s lock status.
*#0*# – Enter the service menu /LCD Test Mode.
*#*#7780#*#* – Reset the /data partition to factory state.
Basic Codes:

*#*#7780#*#* – Factory restore setting.Removes Google account setting & System and application data and settings.
*2767*3855# – Factory format, and will remove all files and settings including the internal memory storage. It will also re-install the firmware.
*#*#4636#*#* – Shows information about your phone and battery.
*#*#273283*255*663282*#*#* – Opens a File copy screen where you can backup your media files e.g. Images, Sound, Video and Voice memo.
*#*#197328640#*#* – Enter into Service mode.
*#*#7594#*#* – Enables your “End call / Power” button into direct power off button without asking for selecting any option(silent mode, aero plane and power-off).
*#*#8255#*#* – Launches G Talk Service Monitor.
*#*#34971539#*#* – Camera information. Please avoid update camera firmware option.

Fern Wifi Cracker Wordlist

W-LAN, GPS and Bluetooth Test Codes:

Fern wifi cracker windows 10

*#*#232339#*#* OR *#*#526#*#* OR *#*#528#*#* – W-LAN test (Use “Menu” button to start various tests).
*#*#232338#*#* – Shows WiFi MAC address.
*#*#1472365#*#* – GPS test.
*#*#1575#*#* – Another GPS test.
*#*#232331#*#* – Bluetooth test.
*#*#232337#*# – Shows Bluetooth device address.

Fern Wifi Cracker Tutorial

Codes to launch various Factory Tests:
*#*#0842#*#* – Device test (Vibration test and BackLight test).
*#*#0588#*#* – Proximity sensor test.
*#*#0*#*#* – LCD test.
*#*#2664#*#* – Touch screen test.
*#*#2663#*#* – Touch screen version.
*#*#0283#*#* – Packet Loopback.
*#*#0673#*#* – Melody test.
*#*#3264#*#* – RAM version.

Fern Wifi Cracker Mac AddressFern

Code for firmware version information:

Fern Wifi Cracker Mac Address Free

*#*#1111#*#* – FTA SW Version.
*#*#2222#*#* – FTA HW Version.
*#*#44336#*#* – PDA, Phone, CSC, Build Time, Changelist number.
*#*#4986*2650468#*#* – PDA, Phone, H/W, RFCallDate.
*#*#1234#*#* – PDA and Phone