WEF: A Powerful Wi-Fi Security Testing Framework

About WEF

WEF stands for WiFi Exploitation Framework, a powerful Wi-Fi security testing framework. WEF implements its functionality based on 802.11 networks and protocols and contains numerous security testing components targeting WPA/WPA2 and WEP, helping researchers conduct automated penetration testing for Wi-Fi and Bluetooth.
The current version of WEF supports Kali Linux, Parrot OS, Arch Linux, and Ubuntu operating systems.

Feature Introduction

Log Generation
WPA/WPA2, WPS, and WEP Attacks
Automated Handshake Cracking
Multiple Templates for EvilTwin Attacks
Check Monitor Mode and Status
2Ghz and 5Ghz Attacks
Custom Dictionary Selector
Automated Detection
Bluetooth Support (Interference, Read, Write)

Supported Testing Types

Deauthentication Attacks
Authentication Attacks
Beacon Flooding Attacks
PMKID Attacks
EvilTwin Attacks
Passive/Stealth Attacks
Pixie Dust Attacks
Null Pin Attacks
Chopchop Attacks
Replay Attacks
Michael Exploitation Attacks
Caffe-Latte Attacks
Interference, Read and Write Bluetooth Connections
GPS Spoofing with HackRF

Tool Requirements

No manual installation of the following tool components is required; WEF will automatically install the dependencies:
aircrack-ng
reaver
mdk4
macchanger
hashcat
xterm
hcxtools
pixiewps
python3
btlejack
crackle
php
hostapd
dnsmasq

Tool Installation

Researchers can use the following commands to clone the project source code locally and complete the tool installation:
git clone https://github.com/D3Ext/WEF
cd WEF
bash setup.sh
One-Liner Installation:
git clone https://github.com/D3Ext/WEF && cd WEF && bash setup.sh

Additional Requirements for Arch Linux

If you are using Arch Linux, you will also need to install some additional packages:
curl -O https://blackarch.org/strap.sh
chmod +x strap.sh
sudo ./strap.sh
pacman -S base-devel libnl openssl ethtool util-linux zlib libpcap sqlite pcre hwloc cmocka net-tools wpa_supplicant tcpdump screen iw usbutils pciutils

Tool Usage

# Different devices may have different interfaces
wef -i wlan0
or
wef --interface wlan0
Once the program starts running, you can enter the “help” command to see more features and help information supported by the tool.
If you do not want to perform all scanning tests on the target AP, you can use WEF in the following way:
# Specify the name of the test
set name my-wifi
# Set the time interval for each test
set time 60
# Specify the number of packets to send for each test
set packets 15

Tool Usage Demonstration

WEF: A Powerful Wi-Fi Security Testing Framework
WEF: A Powerful Wi-Fi Security Testing Framework

License Agreement

The development and release of this project follow the GNU open source license agreement.

Project Address

https://github.com/D3Ext/WEF

Source: FreeBuf.com

The technologies, ideas, and tools involved in the articles published or reprinted by Heibai Zhidao are for educational and communication purposes only for security. No one may use them for illegal purposes or for profit; otherwise, they will bear the consequences themselves!

If there is an infringement, please private message us to delete the article

END

WEF: A Powerful Wi-Fi Security Testing Framework

Leave a Comment