Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to content

D3Ext/WEF

Repository files navigation

WEF

WiFi Exploitation Framework

Coded with 💙 by D3Ext

IntroductionAttacksFeaturesInstallationRequirements


Readme in spanish


WEF

Introduction

This project started over 2021 as a personal tool to easily audit networks without writing long commands or setting all values one by one, in order to automate the whole processes. This is not a professional tool, this project was created to learn about wireless security and for testing purposes. This is a fully offensive framework to audit wifi networks with different types of attacks for WPA/WPA2, WPS and WEP, automated handshake cracking and much more.

If you find an error, please open an issue (you can write it in english or spanish, as you want). If you have any doubt contact me via Discord, my username is d3ext

Attacks

  • Deauthentication attack
  • WIDS Confusion attack
  • Authentication attack
  • Beacon Flood attack
  • TKIP attack (Michael Shutdown Exploitation)
  • Pixie Dust attack
  • Null Pin attack
  • PIN Bruteforce attack
  • ARP Replay attack
  • HIRTE attack
  • Caffe Latte attack
  • Fake Authentication attack
  • WPA/WPA2 handshake capture attack (passively)
  • PMKID attack
  • Evil Twin attack

This attacks are explained here on the Wiki

Features

☑️ WPA/WPA2, WPS and WEP Attacks

☑️ Automatic handshake capture and cracking

☑️ Multiple templates for EvilTwin attack (different languages)

☑️ Enable/disable monitor mode and view interface info (frequencies, chipset, MAC...)

☑️ 2.4 GHz and 5 GHz supported

☑️ Informative attack logs (just done user side)

☑️ Custom wordlist selector when cracking handshakes

☑️ English and spanish supported

And much more

Installation

As root

git clone https://github.com/D3Ext/WEF
cd WEF
bash wef

Take a look at the Wiki where I have more info about the installation

Uninstallation

Simply execute this:

rm -rf /usr/share/wef \
  /usr/bin/wef

Usage

Common usage of the framework

wef -i wlan0 # Your interface name might be different

Help panel

 __      _____ ___
 \ \    / / __| __|
  \ \/\/ /| _|| _|
   \_/\_/ |___|_|

[WEF] WiFi Exploitation Framework 1.4

[*] Interfaces:
    wlan0
    ens33

Required parameters:
    -i, --interface)    The name of your network adapter interface in managed mode

Optional parameters:
    -h, --help)         Show this help panel
    --version)          Print the version and exit

See here for more information about how to use the tool and other related topics

Demo

TODO

  • Pwnagotchi mode
  • Add vendor logo to EvilTwin templates on the fly
  • Test compatibility with others OS
  • KARMA attack
  • In-depth testing of implemented features
  • More general improvement
  • More languages added to Evil Twin templates

Contributing

See CONTRIBUTING.md

Changelog

See CHANGELOG.md

Credits

Thanks to ultrazar and ErKbModifier, they helped me a lot <3

References

https://github.com/aircrack-ng/aircrack-ng
https://github.com/aircrack-ng/mdk4
https://github.com/v1s1t0r1sh3r3/airgeddon
https://github.com/FluxionNetwork/fluxion
https://github.com/P0cL4bs/wifipumpkin3
https://github.com/s0lst1c3/eaphammer
https://github.com/derv82/wifite2
https://github.com/wifiphisher/wifiphisher
https://github.com/ZerBea/hcxtools
https://github.com/ZerBea/hcxdumptool
https://github.com/Tylous/SniffAir
https://github.com/evilsocket/pwnagotchi
https://github.com/koutto/pi-pwnbox-rogueap
https://github.com/koutto/pi-pwnbox-rogueap/wiki/01.-WiFi-Basics

Disclaimer

Creator has no responsibility for any kind of:

  • Illegal use of the project.
  • Law infringement by third parties and users.
  • Malicious act, capable of causing damage to third parties, promoted by the user through this software.

License

This project is under MIT license

Copyright © 2024, D3Ext