{"id":749,"date":"2020-03-09T13:22:44","date_gmt":"2020-03-09T13:22:44","guid":{"rendered":"http:\/\/zerothcode.com\/blog\/?p=749"},"modified":"2020-03-09T13:22:44","modified_gmt":"2020-03-09T13:22:44","slug":"top-10-wifi-hacking-tools-kali-linux","status":"publish","type":"post","link":"https:\/\/zerothcode.com\/blog\/top-10-wifi-hacking-tools-kali-linux\/","title":{"rendered":"The Top 10 Wifi Hacking Tools in Kali Linux"},"content":{"rendered":"<p>In this Top 10 Wifi Hacking Tools, we will be talking about a very popular subject: hacking wireless networks and how to prevent it from being hacked. Wifi is often a vulnerable side of the network when it comes to hacking because WiFi signals can be picked up everywhere and by anyone.<\/p>\n<p>Also, a lot of routers contain vulnerabilities that can be easily exploited with the right equipment and software such as the tools included with Kali Linux.<\/p>\n<p>A lot of router manufacturers and ISPs still turn on WPS by default on their routers which makes wireless security and penetration testing even more important.<\/p>\n<p>With the following Top 10 Wifi Hacking Tools you are able to test our own wireless networks for potential security issues. For most tools, we\u2019ve supplied a link to a tutorial which will help you get started with the tools.<\/p>\n<p>Let\u2019s start off the Top 10 Wifi Hacking Tools with the first tool:<\/p>\n<p>&nbsp;<\/p>\n<h2>1 Aircrack-ng (Wifi hacking kali Linux)<\/h2>\n<p>Aircrack is one of the most popular tools for WEP\/WPA\/WPA2 cracking. The Aircrack-ng suite contains tools to capture packets and handshakes, de-authenticate connected clients and generate traffic and tools to perform brute force and dictionary attacks. Aicrack-ng is an all-in-one suite containing the following tools (among others):<br \/>\n\u2013 Aircrack-ng for wireless password cracking<br \/>\n\u2013 Aireplay-ng to generate traffic and client de-authentication<br \/>\n\u2013 Airodump-ng for packet capturing<br \/>\n\u2013 Airbase-ng to configure fake access points<\/p>\n<p>The Aicrack-ng suite is available for Linux and comes standard with Kali Linux. If you plan to use this tool you have to make sure your Wifi card is capable of packet injection.<\/p>\n<p><a href=\"https:\/\/www.hackingtutorials.org\/wp-content\/uploads\/2015\/05\/Wordpress-screen-5.jpg\" rel=\"prettyPhoto\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-112 no-display appear\" src=\"https:\/\/www.hackingtutorials.org\/wp-content\/uploads\/2015\/05\/Wordpress-screen-5.jpg\" sizes=\"auto, (max-width: 859px) 100vw, 859px\" srcset=\"https:\/\/www.hackingtutorials.org\/wp-content\/uploads\/2015\/05\/Wordpress-screen-5.jpg 859w, https:\/\/www.hackingtutorials.org\/wp-content\/uploads\/2015\/05\/Wordpress-screen-5-300x58.jpg 300w\" alt=\"Aircrack-ng aireplay-ng WPA Handshake\" width=\"859\" height=\"167\" \/><\/a><\/p>\n<p>Website:\u00a0<a href=\"https:\/\/www.aircrack-ng.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.aircrack-ng.org\/<\/a><br \/>\nTutorial:\u00a0<a href=\"https:\/\/www.hackingtutorials.org\/wifi-hacking-tutorials\/how-to-hack-upc-wireless-networks\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.hackingtutorials.org\/wifi-hacking\/how-to-hack-upc-wireless-networks\/<\/a><\/p>\n<h2>2 Reaver<\/h2>\n<p>Number 2 in the Top 10 Wifi Hacking Tools is Reaver. Reaver\u00a0is another popular tool for hacking wireless networks and targets specifically\u00a0WPS vulnerabilities. Reaver performs brute force attacks against Wifi Protected Setup (WPS) registrar PINs to recover the WPA\/WPA2 passphrase. Since many router manufacturers and ISPs turn on WPS by default a lot of routers are vulnerable to this attack out of the box.<\/p>\n<p>In order to use Reaver you need a good signal strength to the wireless router together with the right configuration. On average Reaver can recover the passphrase from vulnerable routers in 4-10 hours, depending on the access point, signal strength and the PIN itself off course. Statistically you have a 50% chance of cracking the WPS PIN in half of the time.<\/p>\n<p><a href=\"https:\/\/www.hackingtutorials.org\/wp-content\/uploads\/2015\/05\/Wordpress-screen-21-e1433583260536.jpg\" rel=\"prettyPhoto\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-108 no-display appear\" src=\"https:\/\/www.hackingtutorials.org\/wp-content\/uploads\/2015\/05\/Wordpress-screen-21-e1433583260536.jpg\" alt=\"Pixie Dust attack\" width=\"710\" height=\"345\" \/><\/a><\/p>\n<p>Website:\u00a0<a href=\"https:\/\/code.google.com\/p\/reaver-wps\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/code.google.com\/p\/reaver-wps\/<\/a><br \/>\nTutorial:\u00a0<a href=\"https:\/\/www.hackingtutorials.org\/wifi-hacking-tutorials\/pixie-dust-attack-wps-in-kali-linux-with-reaver\/\" target=\" _blank\" rel=\"noopener noreferrer\">https:\/\/www.hackingtutorials.org\/wifi-hacking\/pixie-dust-attack-wps-in-kali-linux-with-reaver\/<\/a><\/p>\n<h2>3 Pixiewps<\/h2>\n<p>PixieWPS is a relatively new tool included with Kali Linux and also targets a WPS vulnerability. PixieWPS is written in C and is used to brute force the WPS PIN offline exploiting the low or non-existing entropy of vulnerable access points. This is called a pixie dust attack. PixieWPS requires a modified version of Reaver or Wifite to work with. Since this tools has become quite popular in little time, it\u00a0earns the\u00a0number 3 in our Top 10 Wifi Hacking Tools list.<\/p>\n<p><a href=\"https:\/\/www.hackingtutorials.org\/wp-content\/uploads\/2015\/05\/Wordpress-screen-3-e1433583278700.jpg\" rel=\"prettyPhoto\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-109 no-display appear\" src=\"https:\/\/www.hackingtutorials.org\/wp-content\/uploads\/2015\/05\/Wordpress-screen-3-e1433583278700.jpg\" alt=\"Pixie Dust attack\" width=\"710\" height=\"276\" \/><\/a><\/p>\n<p>Website:\u00a0<a href=\"https:\/\/github.com\/wiire\/pixiewps\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/github.com\/wiire\/pixiewps\/<\/a><br \/>\nModified Reaver:\u00a0<a href=\"https:\/\/github.com\/t6x\/reaver-wps-fork-t6x\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/github.com\/t6x\/reaver-wps-fork-t6x<\/a><br \/>\nTutorial:\u00a0<a href=\"https:\/\/www.hackingtutorials.org\/wifi-hacking-tutorials\/pixie-dust-attack-wps-in-kali-linux-with-reaver\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.hackingtutorials.org\/wifi-hacking\/pixie-dust-attack-wps-in-kali-linux-with-reaver\/<\/a><\/p>\n<h2>4 Wifite<\/h2>\n<p>Wifite is an automated tool to attack multiple wireless networks encrypted with WEP\/WPA\/WPA2 and WPS. On start-up Wifite requires a few parameters to work with and Wifite will do all the hard work. It will capture WPA handshakes, automatically de-authenticate connected clients, spoof your MAC address and safe the cracked passwords.<\/p>\n<p>Website:\u00a0<a href=\"https:\/\/code.google.com\/p\/wifite\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/code.google.com\/p\/wifite\/<\/a><\/p>\n<h2>5 Wireshark<\/h2>\n<p>Wireshark is one of the best network protocal analyzer tools available, if not the best. With Wireshark you can analyse a network to the greatest detail to see what\u2019s happening. Wireshark can be used for live packet capturing, deep inspection of hundreds of protocols, browse and filter packets and is multiplatform.<\/p>\n<p>Wireshark is included with Kali Linux but also available for Windows and Mac. For certain features you do need a Wifi adapter which is supports promiscuous and monitoring mode.<\/p>\n<p>Website:\u00a0<a href=\"https:\/\/www.wireshark.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.wireshark.org<\/a><br \/>\nTutorial:\u00a0<a href=\"https:\/\/www.howtogeek.com\/104278\/how-to-use-wireshark-to-capture-filter-and-inspect-packets\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.howtogeek.com\/104278\/how-to-use-wireshark-to-capture-filter-and-inspect-packets\/<\/a><\/p>\n<p>Or follow one of these online courses:<br \/>\n\u2013\u00a0<a href=\"https:\/\/click.linksynergy.com\/link?id=XhHfvFHk7Zc&amp;offerid=323058.191290&amp;type=2&amp;murl=https%3A%2F%2Fwww.udemy.com%2Fwireshark-crash-course%2F\" target=\"_blank\" rel=\"noopener noreferrer\">Wireshark Crash Course<\/a><br \/>\n\u2013\u00a0<a href=\"https:\/\/click.linksynergy.com\/link?id=XhHfvFHk7Zc&amp;offerid=323058.573978&amp;type=2&amp;murl=https%3A%2F%2Fwww.udemy.com%2Fwireshark-tutorial%2F\" target=\"_blank\" rel=\"noopener noreferrer\">Wireshark Tutorial \u2013 Get Wireshark Certification<\/a><\/p>\n<h2>6 oclHashcat<\/h2>\n<p>Number 6 in our Top 10 Wifi Hacking Tools is oclHashcat. oclHashcat\u00a0is not a dedicated Wifi hacking tool and is not included with Kali Linux,\u00a0but it can do brute force and dictionary attacks on captured handshakes very fast when using a GPU. After using the Aircrack-ng suite, or any other tool, to capture the WPA handshake you can crack it with oclHashcat using your GPU. Using a GPU with oclHashcat, instead of a CPU with Aicrack-ng, will speed up the cracking process a lot. An average GPU can try about 50.000 combinations per second with oclHashcat.<\/p>\n<p>oclHashcat is available for Windows and Linux and has a version for AMD and Nvidia video cards. AMD video cards require Catalyst 14.9 exactly and Nvidia video cards require ForceWare 346.x or later to work.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-113 no-display appear\" src=\"https:\/\/www.hackingtutorials.org\/wp-content\/uploads\/2015\/05\/oclhashcat-300x172.jpg\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" srcset=\"https:\/\/www.hackingtutorials.org\/wp-content\/uploads\/2015\/05\/oclhashcat-300x172.jpg 300w, https:\/\/www.hackingtutorials.org\/wp-content\/uploads\/2015\/05\/oclhashcat.jpg 602w\" alt=\"oclhashcat\" width=\"300\" height=\"172\" \/><\/p>\n<p>Website:\u00a0<a href=\"https:\/\/hashcat.net\/oclhashcat\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/hashcat.net\/oclhashcat\/<\/a><br \/>\nTutorial:\u00a0<a href=\"https:\/\/www.hackingtutorials.org\/wifi-hacking-tutorials\/cracking-wpa-oclhashcat-gpu\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.hackingtutorials.org\/wifi-hacking\/cracking-wpa-oclhashcat-gpu\/<\/a><\/p>\n<h2>7 Fern Wifi Cracker<\/h2>\n<p>Fern Wifi Cracker is a Wireless security auditing and attack tool written in Python. Fern Wifi Cracker is the first dedicated Wifi hacking tool in this list which has an graphical user interface. Fern is able to crack and recover WEP, WPA and WPS keys and contains tools to perform MiTM attacks.<\/p>\n<p>Website:\u00a0<a href=\"https:\/\/code.google.com\/p\/fern-wifi-cracker\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/code.google.com\/p\/fern-wifi-cracker\/<\/a><\/p>\n<h2>8 Wash<\/h2>\n<p>Wash is a tool to determine whether an access point has WPS enabled or not. You can also use Wash to check if an access point locked up\u00a0WPS after a number of Reaver attempts.\u00a0A lot of\u00a0access points locks itself up as a security measure\u00a0when brute forcing the WPS PIN. Wash is included with the Reaver package and comes as a standard tool with Kali Linux.<\/p>\n<p><a href=\"https:\/\/www.hackingtutorials.org\/wp-content\/uploads\/2015\/06\/Wash-WPS-locks-wifi-top-10.jpg\" rel=\"prettyPhoto\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-426 no-display appear\" src=\"https:\/\/www.hackingtutorials.org\/wp-content\/uploads\/2015\/06\/Wash-WPS-locks-wifi-top-10.jpg\" sizes=\"auto, (max-width: 393px) 100vw, 393px\" srcset=\"https:\/\/www.hackingtutorials.org\/wp-content\/uploads\/2015\/06\/Wash-WPS-locks-wifi-top-10.jpg 393w, https:\/\/www.hackingtutorials.org\/wp-content\/uploads\/2015\/06\/Wash-WPS-locks-wifi-top-10-300x131.jpg 300w, https:\/\/www.hackingtutorials.org\/wp-content\/uploads\/2015\/06\/Wash-WPS-locks-wifi-top-10-140x61.jpg 140w, https:\/\/www.hackingtutorials.org\/wp-content\/uploads\/2015\/06\/Wash-WPS-locks-wifi-top-10-240x104.jpg 240w\" alt=\"Wash-WPS-locks wifi hacking tools Top 10 Wifi Hacking Tools\" width=\"393\" height=\"171\" \/><\/a><\/p>\n<p>Website:\u00a0<a href=\"https:\/\/code.google.com\/p\/reaver-wps\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/code.google.com\/p\/reaver-wps\/<\/a><br \/>\nTutorial:\u00a0<a href=\"https:\/\/www.hackingtutorials.org\/wifi-hacking-tutorials\/wps-wifi-networks-with-kali-linux-wash\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.hackingtutorials.org\/wifi-hacking\/wps-wifi-networks-with-kali-linux-wash\/<\/a><\/p>\n<h2>9 Crunch<\/h2>\n<p>Crunch is a great and easy to use tool for generating custom wordlists which can be used for dictionary attacks. Since the success rate of every dictionary attack depends on the quality of the used wordlist, you cannot avoid creating your own wordlist. Especially when you want to create wordlists based on default router passwords. Crunch can also be piped directly to other tools like Aircrack-ng. This feature can save a lot of time since you won\u2019t have to wait until large password lists have been generated by Crunch before you can use them.<\/p>\n<p><a href=\"https:\/\/www.hackingtutorials.org\/wp-content\/uploads\/2015\/06\/Crunch-Password-List-generation.jpg\" rel=\"prettyPhoto\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-427 no-display appear\" src=\"https:\/\/www.hackingtutorials.org\/wp-content\/uploads\/2015\/06\/Crunch-Password-List-generation.jpg\" sizes=\"auto, (max-width: 724px) 100vw, 724px\" srcset=\"https:\/\/www.hackingtutorials.org\/wp-content\/uploads\/2015\/06\/Crunch-Password-List-generation.jpg 724w, https:\/\/www.hackingtutorials.org\/wp-content\/uploads\/2015\/06\/Crunch-Password-List-generation-300x82.jpg 300w, https:\/\/www.hackingtutorials.org\/wp-content\/uploads\/2015\/06\/Crunch-Password-List-generation-140x38.jpg 140w, https:\/\/www.hackingtutorials.org\/wp-content\/uploads\/2015\/06\/Crunch-Password-List-generation-240x66.jpg 240w\" alt=\"Crunch Password List generation Top 10 Wifi Hacking Tools\" width=\"724\" height=\"199\" \/><\/a><\/p>\n<p>Website:\u00a0<a href=\"https:\/\/sourceforge.net\/projects\/crunch-wordlist\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/sourceforge.net\/projects\/crunch-wordlist<\/a><br \/>\nTutorial:\u00a0<a href=\"https:\/\/www.hackingtutorials.org\/general-tutorials\/crunch-password-list-generation\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.hackingtutorials.org\/general-tutorials\/password-list-with-crunch\/<\/a><\/p>\n<h2>10 Macchanger<\/h2>\n<p>Last but not least in this top\u00a010 Wifi Hacking Tools is Macchanger. Macchanger is a little utility which can be used to spoof your MAC address to a random MAC address or you can make up your own. Spoofing your MAC address for wifi hacking might be necessary in order\u00a0to avoid MAC filters or to mask your identity on a wireless network.<\/p>\n<p><a href=\"https:\/\/www.hackingtutorials.org\/wp-content\/uploads\/2015\/06\/MAC-Address-spoofing-with-macchanger.jpg\" rel=\"prettyPhoto\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-416 no-display appear\" src=\"https:\/\/www.hackingtutorials.org\/wp-content\/uploads\/2015\/06\/MAC-Address-spoofing-with-macchanger.jpg\" sizes=\"auto, (max-width: 424px) 100vw, 424px\" srcset=\"https:\/\/www.hackingtutorials.org\/wp-content\/uploads\/2015\/06\/MAC-Address-spoofing-with-macchanger.jpg 424w, https:\/\/www.hackingtutorials.org\/wp-content\/uploads\/2015\/06\/MAC-Address-spoofing-with-macchanger-300x97.jpg 300w, https:\/\/www.hackingtutorials.org\/wp-content\/uploads\/2015\/06\/MAC-Address-spoofing-with-macchanger-140x45.jpg 140w, https:\/\/www.hackingtutorials.org\/wp-content\/uploads\/2015\/06\/MAC-Address-spoofing-with-macchanger-240x78.jpg 240w\" alt=\"MAC Address spoofing with macchanger\" width=\"424\" height=\"137\" \/><\/a><\/p>\n<p>Website:\u00a0<a href=\"https:\/\/github.com\/alobbs\/macchanger\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/github.com\/alobbs\/macchanger<\/a><br \/>\nTutorial:\u00a0<a href=\"https:\/\/www.hackingtutorials.org\/general-tutorials\/mac-address-spoofing-with-macchanger\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.hackingtutorials.org\/general-tutorials\/mac-address-spoofing-with-macchanger\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this Top 10 Wifi Hacking Tools, we will be talking about a very popular subject: hacking wireless networks and<\/p>\n","protected":false},"author":1,"featured_media":750,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[529],"tags":[],"yst_prominent_words":[872,867,866,876,870,882,874,869,877,645,881,871,868,873,875,878,560,646,644,643],"class_list":["post-749","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-termux"],"_links":{"self":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts\/749","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/comments?post=749"}],"version-history":[{"count":0,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts\/749\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/media\/750"}],"wp:attachment":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/media?parent=749"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/categories?post=749"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/tags?post=749"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/yst_prominent_words?post=749"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}