WEF
WiFi Exploitation Framework
Coded with
by D3Ext
Introduction β’ Attacks β’ Features β’ Installation β’ Requirements
Introduction
This project started over 2021 as a personal tool to easily audit networks without writing long commands nor setting all values one by one and to automate the whole processes. This is not a professional tool, I created this project to learn and for testing purposes. After some time the repository obtained a bunch of stars so I decided to improve it. Itβs a fully offensive framework to audit wifi networks with different types of attacks for WPA/WPA2, WPS and WEP, automated hash cracking, and much more.
If you have any error please open an issue (if you want to write it in spanish you can do it). If you have any doubt contact me via Discord, my username is d3ext
Attacks
- Deauthentication attack
- WIDS Confusion attack
- Authentication attack
- Beacon Flood attack
- TKIP attack (Michael Shutdown Exploitation)
- Pixie Dust attack
- Null Pin attack
- PIN Bruteforce attack
- ARP Replay attack
- HIRTE attack
- Caffe Latte attack
- Fake Authentication attack
- WPA/WPA2 handshake capture attack
- PMKID attack
- EvilTwin attack
You have an explanation of the different attacks here on Wikiβs repo
Features
WPA/WPA2, WPS and WEP Attacks
Automatic handshake capture and cracking
Multiple templates for EvilTwin attack (different languages)
Enable/disable monitor mode and view interface info (frequencies, chipset, MACβ¦)
2.4 GHz and 5 GHz supported
Informative attack logs (just done user side)
Custom wordlist selector when cracking
English and spanish supported
And much more
Installation
As root
git clone https://github.com/D3Ext/WEF cd WEF bash wef
Take a look at the Wiki where I have more info about the installation
Uninstallation
Simply execute this:
rm -rf /opt/wef \ /usr/bin/wef
Usage
Common usage of the framework
wef -i wlan0 # Your interface name might be different
Help panel
__ _____ ___
\ \ / / __| __|
\ \/\/ /| _|| _|
\_/\_/ |___|_|
[WEF] WiFi Exploitation Framework 1.3
[*] Interfaces:
docker0
ens33
lo
Required parameters:
-i, --interface) The name of your network adapter interface in managed mode
Optional parameters:
-h, --help) Show this help panel
--version) Print the version and exit
See here for more information about how to use the tool and other related topics
Demo
TODO
EvilTwin attack for Enterprise networksMore options to crack handshakesBetter way to scan APsIdentify found devices vendors by their MAC addressesConfig file improved with more settingsGeneral improvements- Test compatibility with others OS
- Support WPA3 dictionary attack
- MANA and KARMA attack
- In-depth testing of implemented features
- More general improvement
Contributing
See CONTRIBUTING.md
Changelog
See CHANGELOG.md
Credits
Thanks to ultrazar and ErKbModifier, they helped me a lot <3
References
https://github.com/v1s1t0r1sh3r3/airgeddon
https://github.com/FluxionNetwork/fluxion
https://github.com/P0cL4bs/wifipumpkin3
https://github.com/s0lst1c3/eaphammer
https://github.com/derv82/wifite2
https://github.com/aircrack-ng/mdk4
https://github.com/aircrack-ng/aircrack-ng
https://github.com/wifiphisher/wifiphisher
https://github.com/ZerBea/hcxtools
https://github.com/ZerBea/hcxdumptool
https://github.com/Tylous/SniffAir
https://github.com/koutto/pi-pwnbox-rogueap
https://github.com/koutto/pi-pwnbox-rogueap/wiki/01.-WiFi-Basics
Disclaimer
Creator has no responsibility for any kind of:
- Illegal use of the project.
- Law infringement by third parties and users.
- Malicious act, capable of causing damage to third parties, promoted by the user through this software.
License
This project is under MIT license
Copyright Β© 2024, D3Ext