FruityWifi Wireless Network Auditing Tool

H1 { margin-bottom: 0.08in; }H1.western { font-family: “Liberation Serif”,serif; }H1.cjk { font-family: “Droid Sans”; }H1.ctl { font-family: “FreeSans”; }P { margin-bottom: 0.08in; }


Wireless (a network without wire) is
the mean of communication and it has successfully replaced the wired
network; the objective of this article is not to discuss the pros and
cons of it, nor we are going to discuss how it replaced wire network.
But we will discuss a tool that has been created to perform an
auditing of wireless network.

FruityWifi is a wireless network
auditing tool based in the Wifi Pineapple idea. The application can
be installed in any Debian based system. Tested in Debian, Kali
Linux, BugTraq, Kali Linux ARM (Raspberry Pi), Raspbian (Raspberry
Pi), Pwnpi (Raspberry Pi).
  • Hostapd Karma
  • URLsnarf
  • DNSspoof
  • Kismet
  • Squid (code injection
  • SSLstrip (code injection
  • nmap


The following tutorial has been created
on Kali Linux, however you can follow the same technique on different
distributions of Linux.

Get the shell script from the website
and open any text editor paste it there and save it to name.sh
Now open the terminal and locate the
directory where you have saved the shell script, run the script as
given. The installation part can be done by the script itself, so you
need not to worry about it.

Installation Process

After the installation part, Go to
http://localhost/FruityWifi (https)

user: admin
pass: admin

Other Tutorials

P { margin-bottom: 0.08in; }A:link { }

Note: If you want to learn more about Linux and Windows based Penetration testing, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...