Skip to content

Features

D3Ext edited this page Aug 21, 2024 · 2 revisions
  • Intuitive interface
  • Compatibility with most Linux distros (Kali, Parrot, Arch, Ubuntu, Fedora...)
  • All attacks and operations are fully automatized
  • Attacks for WPA/WPA2, WPS and WEP
  • Malleable settings via config file (/usr/share/wef/wef.cnf)
  • Enable/disable monitor mode automatically
  • MAC randomization (macchanger)
  • Show info about the network adapter
  • Headless mode supported (via config file)
  • 2.4 GHz and 5 GHz supported
  • Configurable timeout for attacks
  • Simple logs to keep track of your attacks (stored under /usr/share/wef/main/logs/)
  • All temporal files are removed as well as changes are reverted on exit
  • Automated WPA/WPA2 and PMKID handshakes capture
  • Automated handshake cracking with different tools
  • Suitable with Docker
  • Evil Twin attacks with multiple options
    • Optional DoS against legitimate AP
    • Check if submitted passwords are valid
    • Enterprise mode supported
    • MAC spoofing
Clone this wiki locally