WEF: Wi-Fi Exploitation Framework

WiFi Exploitation Framework

This tool is designed for security researchers and penetration testers to analyze and exploit vulnerabilities in Wi-Fi networks. It provides an intuitive interface with a wide range of automated and manual attack techniques to test WPA/WPA2, WPS, and WEP security. With support for both 2.4 GHz and 5 GHz networks, detailed logging and customizable attack options, it offers flexibility for different testing scenarios. This is not a professional tool.

WiFi Exploitation

SUPPORTED ATTACKS:

  • DoS (optional handshake capture):
    • Deauthentication attack
    • WIDS Confusion attack
    • Authentication attack
    • Beacon Flood attack
    • TKIP attack (Michael Shutdown Exploitation)
  • WPS:
    • Pixie Dust attack
    • PIN Bruteforce attack
    • Null Pin attack
  • WEP:
    • ARP Replay attack
    • HIRTE attack
    • Caffe Latte attack
    • Fake Authentication attack
  • Handshake:
    • WPA handshake capture (without deauth)
    • PMKID attack (clientless)
    • Pwnagotchi mode
  • Rogue AP:
    • Evil Twin attack
      • BSSID spoofing
      • Karma mode
      • Enterprise WPA supported
      • Deauth supported
  • Other attacks:
    • Automatic attack mode (Auto PWN)
    • WPA3 dictionary attack

All the mentioned attacks/techniques are explained here on the Wiki

FEATURES:

☑️ WPA/WPA2, WPS, WEP, Rogue-AP, and Handshake Attacks

☑️ Automatic attack mode based on the features of the AP

☑️ Automatic handshake capture

☑️ Online and offline handshake cracking

☑️ Simple login template for Evil Twin attack (different languages)

☑️ Enable/disable monitor mode and view information about the network interface (frequencies, chipset, MAC…)

☑️ 2.4 GHz and 5 GHz supported

☑️ Informative reports using HTML templates

☑️ English and spanish supported

Install & Use

Copyright (C) 2022 D3Ext