FruityWifi Wireless Network Auditing Tool

H1 { margin-bottom: 0.08in; }H1.western { font-family: “Liberation Serif”,serif; }H1.cjk { font-family: “Droid Sans”; }H1.ctl { font-family: “FreeSans”; }P { margin-bottom: 0.08in; }


Wireless (a network without wire) is
the mean of communication and it has successfully replaced the wired
network; the objective of this article is not to discuss the pros and
cons of it, nor we are going to discuss how it replaced wire network.
But we will discuss a tool that has been created to perform an
auditing of wireless network.

FruityWifi is a wireless network
auditing tool based in the Wifi Pineapple idea. The application can
be installed in any Debian based system. Tested in Debian, Kali
Linux, BugTraq, Kali Linux ARM (Raspberry Pi), Raspbian (Raspberry
Pi), Pwnpi (Raspberry Pi).
  • Hostapd Karma
  • URLsnarf
  • DNSspoof
  • Kismet
  • Squid (code injection
  • SSLstrip (code injection
  • nmap


The following tutorial has been created
on Kali Linux, however you can follow the same technique on different
distributions of Linux.

Get the shell script from the website
and open any text editor paste it there and save it to name.sh
Now open the terminal and locate the
directory where you have saved the shell script, run the script as
given. The installation part can be done by the script itself, so you
need not to worry about it.

Installation Process

After the installation part, Go to
http://localhost/FruityWifi (https)

user: admin
pass: admin

Other Tutorials

P { margin-bottom: 0.08in; }A:link { }

Note: If you want to learn more about Linux and Windows based Penetration testing, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What are Online Casinos doing to be as Safe and Secure as Possible?

Online casinos have continued to increase in popularity over recent years as more and more gamblers have turned to virtual options to further enhance...

Reconnaissance for Bug Bounty Hunters & Pentesters

New to the bug bounty and confused about where to start? Worry not! This reconnaissance for bug bounty hunters guides you to take the...

Access & Manage Android Phone Remotely – L3MON Tutorial

There is software available, like Metasploit, to gain remote access to any android phone. But other than that, we have the L3MON tool (A...

How to Hide Shellcode Behind Closed Port?

Every company has a variety of scanners for analyzing its network and identifying new or unknown open ports. It's unthinkable to disguise the potentially...