Wifi Penetration Testing.
Wifi is maybe one of the best technologies gifted to us. Wifi helps us to upgrade our messy wired devices to a clean, well-organized way.
But as all technologies do, wifi also has some security issues, especially for the public wifi networks. Any intruder can attack our devices by accessing our Wifi networks silently.
We must analyze our wireless network from time to time to prevent hacking attacks. There are a lot of tools already to do wifi penetration testing but the tool we are going to discuss here is a little different from others.
Ehtools. A framework of serious wifi penetration testing tools developed by the entynetproject.
What makes Ehtools framework different from others?
When we go for wifi penetration testing, we have to use different tools for different tasks. That's becomes very irritating sometimes.
Ehtools just organizes and links the tools used for wifi penetration testing that already exists so that we can control them from one place. Examples of such tools are Aircrack-ng, Airdump-ng, WPS Pixie- Dust, etc.
Let's see how we can configure Ehtools on the Linux Platform.
Note: You must be logged in as 'root' in order to run the tool error-free.
Configuring EhTools on Linux
Fire up your Linux machine and download Ehtools from Github. Now navigate to the directory where you've downloaded it and expand it. Here you will see a shell script named 'install.sh'. You need to launch it in order to install the tool. Before launching you must give root permission to it. Just type the commands one by one as you can see in the screenshot below.
Now it will ask for the version of Ehtools you want to install. It offers two versions- pro and lite. You can buy the tools pro version from here but if you don't want to, you can continue installing the lite version.
As most will prefer going with the lite for testing purposes, we are choosing the lite as well.
Now you have to set a username and password to protect ehtools from unauthorized access. type 'yes' and hit enter.
The last step is creating a config key. Type the key you want to set and hit enter.
Here we go! we have successfully configured the tool.
Many developers working on these types of tools. They do not create new tools but link the tools that already exist and used for the same category of penetration testing. It helps us to control different tools from one place with a single line of commands.