WEF: WiFi Exploitation Framework
WEF – WiFi Exploitation Framework
This project started over 2021 as a personal tool to easily audit networks without writing long commands or setting all values one by one, in order to automate the whole processes. This is not a professional tool, this project was created to learn about wireless security and for testing purposes. This is a fully offensive framework to audit wifi networks with different types of attacks for WPA/WPA2, WPS and WEP, automated handshake cracking and much more.
Attacks
- Deauthentication attack
- WIDS Confusion attack
- Authentication attack
- Beacon Flood attack
- TKIP attack (Michael Shutdown Exploitation)
- Pixie Dust attack
- Null Pin attack
- PIN Bruteforce attack
- ARP Replay attack
- HIRTE attack
- Caffe Latte attack
- Fake Authentication attack
- WPA/WPA2 handshake capture attack (passively)
- PMKID attack
- Evil Twin attack
This attacks are explained here on the Wiki
Feature
☑️ WPA/WPA2, WPS and WEP Attacks
☑️ Automatic handshake capture and cracking
☑️ Multiple templates for EvilTwin attack (different languages)
☑️ Enable/disable monitor mode and view interface info (frequencies, chipset, MAC…)
☑️ 2.4 GHz and 5 GHz supported
☑️ Informative attack logs (just done user side)
☑️ Custom wordlist selector when cracking handshakes
☑️ English and spanish supported
And much more