Wireless Attack Hacking Tools: Wifite and WEF

Wireless Attack Hacking Tools: Wifite and WEF

Wireless Attack Hacking Tools: Wifite and WEF

Ending last month, January 2023, we share one more interesting and useful post to learn about the field of Ethical hacking. Specifically, we address 2 similar free and open tools, coincidentally named the same, i.e. hacking tools, but from different developers. Which, were an ideal replacement for one already quite old and expired called fsociety.

Furthermore, both Hacking Tools applications, were similar in that they offered to facilitate the management and automation of various hacking software tools. But, with the difference that one was for Computers and another for Mobiles. For this reason, today we thought it was ideal to present 2 more free and open tools in this area. But, more specifically, for the field of Wireless Hacking (WiFi). And these 2 apps from the field of “Wireless Attack Hacking Tools” consist of Wifi and WEF.

Hacking Tools 2023

And, before starting this interesting post about the Wi-Fi and WEF apps belonging to the field of “Wireless Attack Hacking Tools”, we recommend the previous publication, for later reading:

Hacking Tools 2023: Ideal for use on GNU/Linux
Related article:
Hacking Tools 2023: Ideal for use on GNU/Linux

Wifite and WEF: Wireless Attack Hacking Tools apps

Wifite and WEF: Wireless Attack Hacking Tools apps

What is Wi-Fi?

According to official website on GitHub by Wi-Fi, this tool in the field of “Wireless Attack Hacking Tools” It is briefly described as follows:

"Wifite is an application specifically designed for Linux, with the goal of being an automated wireless attack tool. Consequently, it is specially designed to be used on GNU/Linux Distributions in the field of Hacking and Pentesting, such as: Kali Linux, Parrot, Pentoo, BackBox; and any other Linux distribution with wireless drivers patched for code injection".

What is Wi-Fi?

Other important information about Wifite is that you must run as root, since it is required by the set of programs you use. For this reason, and as good practice in terms of Computer Security, Hacking or Pentesting, the ideal is to use said application from a Live CD Kali Linux bootable, or a bootable USB stick (for persistent), or a Virtual Machine, as long as you have a wireless USB Dongle handy.

Furthermore, Wifite assumes that in the running hardware there exists a wireless card and the appropriate drivers which are patched for injection and promiscuous/monitor mode. Last but not least, its developer recommends test your new development called wifi 2, in case of not obtaining satisfactory results with Wifite. This is because Wifite does not receive frequent updates and has many bugs, while Wifite 2 adds more features, bug fixes and reliability.

Later, in another separate post, we will address its installation and use in more detailHowever, all that information is well detailed on the GitHub site, for both versions.

What is WEF?

What is WEF?

This other app called WEF (WiFi Exploitation Framework) according to your official website on GitHub It is briefly described as follows:

"A fully offensive framework for 802.11 networks and protocols with different types of attacks for WPA/WPA2 and WEP, automated hash cracking, and much more. Tested and supported on Kali Linux, Parrot OS and Arch Linux".

And just like other similar software, is capable of attacks of the following type:

  1. Deauthentication attack.
  2. Authentication Attack.
  3. Beacon Flood Attack.
  4. PMKID Attack.
  5. EvilTwin Attack (EvilTwin Attack).
  6. Passive/Stealthy Attack.
  7. Pixie Dust Attack.
  8. Null Pin Attack.
  9. Attacks to the WEP protocol (WEP Protocol Attacks).
  10. Michael Exploitation Attack.

fly more information about its installation and use is in the Wiki from their GitHub site.

Other popular Wireless Attack Hacking Tools apps

Although, when installing and using Wifi and WEF, they install and use other apps in the scope of the “Wireless Attack Hacking Tools”, we can mention separately some of them and other existing ones, such as:

Kali Linux 2022.4

Kali Linux 2022.4 is the latest version of the distribution released this year.

GNU / Linux Distros for Hacking and Pentesting

And finally, we leave you a great list with many of the existing ones GNU / Linux Distros, specially dedicated to IT domain of the Hacking and Pentesting, where they could use these apps (Wife and WEF):

  1. Time: Based on Debian.
  2. Parrot: Based on Debian.
  3. BackBox: Based on Ubuntu.
  4. Caine: Based on Ubuntu.
  5. Demon: Based on Debian.
  6. Bugtraq: Based on Ubuntu, Debian and OpenSUSE.
  7. ArchStrike: Based on Arch.
  8. BlackArch: Based on Arch.
  9. Pentoo: Based on Gentoo.
  10. Fedora Security Lab: Based on Fedora.
  11. WiFisLax: Based on Slackware.
  12. Dracos: Based on based on LFS (Linux from Scratch).
  13. Samurai Web Testing Framework: Based on Ubuntu.
  14. Network Security Toolkit: Based on Fedora.
  15. DEFT: Based on Ubuntu.
  16. OnionSecurity: Based on Ubuntu.
  17. Santoku: Based on based on LFS.
Related article:
Wifislax64: The ideal distro for security in WiFi networks

Roundup: Banner post 2021

Summary

In summary, Wifi and WEF They are undoubtedly 2 useful and interesting applications to know and try at some point, if you are one of those passionate about computers and computing, who likes Ethical hacking. These apps in the field of “Wireless Attack Hacking Tools” will undoubtedly allow you to get started in the knowledge of the exploration of wireless network traffic, facilitating, among many things, the power find faults or weaknesses in wireless networks. Everything in favor of, improve and help others, in the field of Computer Security.

Finally, do not forget to contribute your opinion on today's topic, via comments. And if you liked this post, do not stop sharing it with others. Also, remember visit our home page en «DesdeLinux» to explore more news, and join our official channel of Telegram from DesdeLinux, West group for more information on today's topic.


Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.