FruityWifi Wireless Network Auditing Tool

H1 { margin-bottom: 0.08in; }H1.western { font-family: “Liberation Serif”,serif; }H1.cjk { font-family: “Droid Sans”; }H1.ctl { font-family: “FreeSans”; }P { margin-bottom: 0.08in; }

Wireless (a network without wire) is
the mean of communication and it has successfully replaced the wired
network; the objective of this article is not to discuss the pros and
cons of it, nor we are going to discuss how it replaced wire network.
But we will discuss a tool that has been created to perform an
auditing of wireless network.

FruityWifi is a wireless network
auditing tool based in the Wifi Pineapple idea. The application can
be installed in any Debian based system. Tested in Debian, Kali
Linux, BugTraq, Kali Linux ARM (Raspberry Pi), Raspbian (Raspberry
Pi), Pwnpi (Raspberry Pi).
  • Hostapd Karma
  • URLsnarf
  • DNSspoof
  • Kismet
  • Squid (code injection
  • SSLstrip (code injection
  • nmap


The following tutorial has been created
on Kali Linux, however you can follow the same technique on different
distributions of Linux.

Get the shell script from the website
and open any text editor paste it there and save it to
Now open the terminal and locate the
directory where you have saved the shell script, run the script as
given. The installation part can be done by the script itself, so you
need not to worry about it.

Installation Process

After the installation part, Go to
http://localhost/FruityWifi (https)

user: admin
pass: admin

Other Tutorials

P { margin-bottom: 0.08in; }A:link { }

Note: If you want to learn more about Linux and Windows based Penetration testing, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

How to Become an Expert in Ethical Hacking

This article is mainly addressing the audience who wants to pursue their career in Cybersecurity as a professional that provides ethical hacking services, whether...

5 Cybersecurity Tips to Keep in Mind When Working From Home

  Due to the ongoing global health crisis, more and more people are being forced to work from their homes. In fact, Forbes estimates that about...

The Complete OSINT Tutorial to Find Personal Information About Anyone

This article mainly focuses on how to discover a person's digital footprint and gather personal data by using open-source intelligence (OSINT). So, in its...

How to find the password of hacked email addresses using OSINT

Open-source intelligence or OSINT is a potent technique, and it can give a lot of valuable information, if implemented correctly with the right strategy...