Top list Wifi Hacking Tools in Kali Linux for computer security

Top List Wifi Hacking Tools in Kali Linux – Penetration Testing and Ethical Hacking Linux Distribution

What is Kali Linux

Kali Linux is a distribution based on Debian GNU / Linux, designed for forensic computing and computer security , in particular to perform penetration tests . It is created and managed by the Offensive Security group. He is considered the successor of Backtrack.

Kali Linux offers users easy access to a large collection of security tools from port scanning to password crackers. Its GUI is GNOME 3. It supports live CD and live USB, this feature offers users to boot Kali directly from CD / USB without the need for installation, even if in the options there is the possibility of installation on the hard disk. It is a supported platform for the Metasploit Project Metasploit framework (developed by rapid7), a tool for the development and execution of exploits towards remote machines or towards machines belonging to one’s own LAN. It also contains the security programs: Wireshark, John the Ripper, Nmap and Aircrack-ng.

The 2016.2 release of August 31, 2016 is the most recent version.

Top List Wifi Hacking Tools for “Penetration Testing and Ethical Hacking Linux Distribution”

Aircrack-ng

Aircrack-ng is a Wi-Fi utility designed to crack WEP and WPA-PSK passwords.

The operation of aircrack-ng is divided into three phases:

  • Detection of nearby networks and determination of the BSSID, ESSID, access point channel and network interface.
  • Interception of packets
  • Access string processing, retrieving it from packets if the network is WEP, through brute force if WPA.
  • If you use this utility make sure that your wi-fi card is compatible with packet injection

Reaver

Reaver is surely according to one of the most important Wifi hacking tools. and it is a very popular tool for hacking wireless networks. Reaver’s goals are WPS vulnerabilities. Reaver performs brute force attacks on Wi-Fi Protected Setup (WPS) PINs registered to retrieve the WPA2 / WPS passphrase. Since there are many router manufacturers who turn to Internet service providers by default, a lot of routers are vulnerable to this type of attack.

PixieWPS

PixieWPS is a new tool included in the Kali Linux release. PixieWPS is written in C and is used for offline Brute Force WPS PIN attacks and takes advantage of the low entropy of vulnerable access points. Typically this attack is also called Pixie Dust Attack. PixieWPS needs a modified version of Wifite or Reaver to work with.

Wifite

Wifite is an excellent tool for cracking wifi networks, capable of greatly simplifying and speeding up the parameters to be launched at  airmon-ng airodump-ng aireplay-ng aircrack-ng . The strengths concern the possibility of cracking several networks simultaneously, the management of the monitor mode automatically, the possibility of using a dictionary attack, the automatic management of all the steps, from the fake mac address to the final cracking of the network .

Wireshark

In IT and telecommunications Wireshark (previously called Ethereal) is a software for protocol analysis or packet sniffer (literally sniff-packets) used for solving network problems, for the analysis and development of protocols or communication software and for teaching. Wireshark has all the features of a standard protocol analyzer.

The Wireshark features are very similar to those of tcpdump, but with a graphical interface, and more sorting and filtering features. Allows the user to observe all traffic on the network using the promiscuous mode of the network adapter. Typically it refers to Ethernet networks, but other types of physical networks can be analyzed.

Wireshark is distributed under an Open Source license; runs on most Unix and compatible systems (including GNU / Linux, Sun Solaris, FreeBSD, NetBSD, OpenBSD and macOS) and on Microsoft Windows systems using the Qt cross-platform graphics toolkit.

Wireshark manages to “understand” the structure of different network protocols, is able to identify any encapsulations, recognizes the individual fields and allows us to interpret their meaning.

To capture packets Wireshark does not have its own code, but uses libpcap / WinPcap, therefore it can only work on networks supported by libpcap or WinPcap.

The characteristics of Wireshark:

  • It is possible to analyze data acquired in real time on an active network (“from the wire”), as well as analyze data previously saved on capture files.
  • Data can be acquired live on Ethernet, FDDI, PPP, Token Ring, IEEE 802.11, classic IP on ATM, and loopback interfaces (not all types are supported on all platforms).
  • It is possible to analyze the data both via graphical interface and from the command line, with the “tshark” program
  • The data captured on file can be easily edited, converted or filtered, through command line options of the “editcap” program.
  • You can filter the data to be displayed, and use visualization filters to selectively color or highlight summary information about packages.
  • Hundreds of communication protocols can be broken down and analyzed.
  • WinPcap capture software, which previously had to be downloaded separately, is now included in the package.
  • The command line version, Ywireshark, allows you to work comfortably on Unix and Unix-like systems, but is also available on Windows.

On many platforms, capturing traffic at a basic level from a network interface requires adequate administration permissions: for this reason, Wireshark is often run by root (even on platforms that do not require it). During the capture of network traffic in real time, the routines of a large number of protocol decomposers are used: in the event of a bug, even on single routines, serious security problems can arise, with the possibility of remote code execution. Due to the large number of vulnerabilities that have occurred in the past, and concerns about possible future improvements, OpenBSD has removed Ethereal from its ports to version 3.6.

oclHashcat

Among the fastest currently available, it allows you to crack encrypted hashes with over a hundred different algorithms ( MD4, MD5, SHA1, SHA-256, SHA-512, bcrypt etc … ).

It is free and available on all popular operating systems, Windows, Linux, Mac Os. But its real peculiarity lies in being able to take advantage of the computing power of the GPUs (Nvidia or AMD) as well as the more classic CPU. Think of up to over 128 GPUs simultaneously placed on distributed systems.

Fern

Fern is a software written in Python that can be fully managed through a GUI, as well as offering valuable support for cracking WEP and WPA / WPA2 networks, it allows you to locate a Wireless network using the Google Maps API .

macchanger

Last but not least in this Top list Wifi Hacking Tools is Macchanger. Macchanger is a small utility that can be used to falsify / change your machine’s MAC address. In computer science and telecommunications the MAC address (in English MAC address , where MAC stands for Media Access Control), also called physical address, ethernet address or LAN address, is a 48 bit (6 byte) code assigned uniquely by the manufacturer to every ethernet or wireless network card produced in the world, however modifiable at software level.

It basically represents an identifier for a particular network device at the local network level: for example two network cards in two different computers will have two different names (and therefore different MAC addresses), just as an Ethernet card and a card will have different names wireless devices located on the same computer.

 

Leave a Comment