CIP Cyber

FruityWifi Wireless Network Auditing Tool

Table of Contents

H1 { margin-bottom: 0.08in; }H1.western { font-family: “Liberation Serif”,serif; }H1.cjk { font-family: “Droid Sans”; }H1.ctl { font-family: “FreeSans”; }P { margin-bottom: 0.08in; }

http://www.ehacking.net/2013/12/fruitywifi-wireless-network-auditing.html

Wireless (a network without wire) is
the mean of communication and it has successfully replaced the wired
network; the objective of this article is not to discuss the pros and
cons of it, nor we are going to discuss how it replaced wire network.
But we will discuss a tool that has been created to perform an
auditing of wireless network.

FruityWifi is a wireless network
auditing tool based in the Wifi Pineapple idea. The application can
be installed in any Debian based system. Tested in Debian, Kali
Linux, BugTraq, Kali Linux ARM (Raspberry Pi), Raspbian (Raspberry
Pi), Pwnpi (Raspberry Pi).
SCANNER MODULES
  • Hostapd Karma
  • URLsnarf
  • DNSspoof
  • Kismet
  • Squid (code injection
    capabilities)
  • SSLstrip (code injection
    capabilities)
  • nmap

FruityWifi
Tutorial

The following tutorial has been created
on Kali Linux, however you can follow the same technique on different
distributions of Linux.

Get the shell script from the website
and open any text editor paste it there and save it to name.sh
Now open the terminal and locate the
directory where you have saved the shell script, run the script as
given. The installation part can be done by the script itself, so you
need not to worry about it.

Installation Process

After the installation part, Go to
http://localhost/FruityWifi (https)

user: admin
pass: admin

Other Tutorials

P { margin-bottom: 0.08in; }A:link { }


Note: If you want to learn more about Linux and Windows based Penetration testing, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
CIP Cyber Staff

CIP Cyber Staff

CIP Cyber Staff comprises CIP cybersecurity experts committed to delivering comprehensive information on critical infrastructure protection. The content covers diverse topics, equipping professionals to defend organizations and communities in an ever-evolving cyber landscape.

Most popular

Industrial Cybersecurity

Want always be up to date?

Don't miss the latest news

By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.

CIP Training & Certifications

Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings

Related Articles

How to Reset Kali Linux Root Password?

Forgot the Kali Linux root password? Stress not! This tutorial discusses the steps to reset Kali Linux system password. Follow the steps, and you will

Want always be up to date?

Don't miss the latest news

By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.

CIP Training & Certifications

Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings