Fern Wifi Cracker Tutorial

After update, Fern WiFi Cracker stops whilst bruteforcing. Saw there were a lot of updates so I succumbed and now Fern just stops whilst in the bruteforcing phase. Re-run and it will stop, but not necessarily at the same point in the dictionary. Wifi WEP WPA Fern Pro Fern Wifi Audit Wifi Linux WPS DHCP DNS SERVER.

| '' | 
| Fern-Wifi-Cracker 2.0 Not working with Ralink Chipsets (tested on AWUS036NH ) | 
| What steps will reproduce the problem? | 
| 1.start fern-wifi | 
| 2.select interface | 
| What is the expected output? What do you see instead? | 
| expected output: 'Monitor mode enabled on wlan0mon' | 
| instead: stuck in set_monitor_thread() | 
| What version of the product are you using? On what operating system? | 
| Linux Mint 64: | 
| Linux xxxxxxxx 3.13.0-24-generic #47-Ubuntu SMP Fri May 2 23:30:00 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux | 
| Please provide any additional information below. | 
| the reason: you only search for monitors with *mon pattern | 
| realtek chipsets and recent airmon-ng version use a new pattern: wlandmon | 
| here is a bugfix, i use for my version: | 
| '' | 
| defset_monitor_thread(self,monitor_card,mac_setting_exists,last_settings): | 
| #print 'starting new thread' | 
| status=str(commands.getoutput('airmon-ng start %s'%(monitor_card))) | 
| #print 'nStatus of airmon-ng start', monitor_card, ':', status,'n' | 
| if ('monitor mode enabled'instatus) or ('monitor mode vif enabled'instatus): #fix for ralink if | 
| monitor_interface_process=str(commands.getoutput('airmon-ng')) | 
| #print 'monitor_interface_process:', monitor_interface_process, 'n' | 
| if ('monitor mode enabled'instatus): | 
| regex=re.compile('mond',re.IGNORECASE) | 
| elif ('monitor mode vif enabled'instatus): | 
| regex=re.compile('wlandmon',re.IGNORECASE) #changed from mond to wlandmon | 
| interfaces=regex.findall(monitor_interface_process) | 
| print'available interfaces:', interfaces | 
| if(interfaces): | 
| self.monitor_interface=interfaces[0] | 
| else: | 
| self.monitor_interface=monitor_card | 
| print'setting self.monitor_interface to', self.monitor_interface | 
| variables.monitor_interface=self.monitor_interface | 
| self.interface_combo.setEnabled(False) | 
| variables.wps_functions.monitor_interface=self.monitor_interface | 
| self.emit(QtCore.SIGNAL('monitor mode enabled')) | 
| # Create Fake Mac Address and index for use | 
| mon_down=commands.getstatusoutput('ifconfig %s down'%(self.monitor_interface)) | 
| ifmac_setting_exists: | 
| variables.exec_command('macchanger -m %s %s'%(last_settings,self.monitor_interface)) | 
| else: | 
| variables.exec_command('macchanger -A %s'%(self.monitor_interface)) | 
| mon_up=commands.getstatusoutput('ifconfig %s up'%(self.monitor_interface)) | 
| foriterateinos.listdir('/sys/class/net'): | 
| ifstr(iterate) str(self.monitor_interface): | 
| os.chmod('/sys/class/net/'+self.monitor_interface+'/address',0777) | 
| variables.monitor_mac_address=reader('/sys/class/net/'+self.monitor_interface+'/address').strip() | 
| variables.wps_functions.monitor_mac_address=variables.monitor_mac_address | 
| else: | 
| print'problem occured while setting up the monitor mode of selected', monitor_card | 

 commented Jan 4, 2015 
| now intergrated in Fern-Wifi-Cracker 2.1 ( https://code.google.com/p/fern-wifi-cracker/issues/detail?id=97 ) | 
 commented Jan 21, 2015 
| Hello, I use Kali Linux in VMware Fusion (Mac OS X). When i choose the wlan0 (AWUSO36NH) on fern-wifi, a problem appears ... I'm trying to attack and WPA access. So i think Fern-Wifi Cracker doesn't work well with AWUS036NH. Sorry for my poor english. | 
Using Fern Wifi Cracker
| '' | 
| Fern-Wifi-Cracker 2.0 Not working with Ralink Chipsets (tested on AWUS036NH ) | 
| What steps will reproduce the problem? | 
| 1.start fern-wifi | 
| 2.select interface | 
| What is the expected output? What do you see instead? | 
| expected output: 'Monitor mode enabled on wlan0mon' | 
| instead: stuck in set_monitor_thread() | 
| What version of the product are you using? On what operating system? | 
| Linux Mint 64: | 
| Linux xxxxxxxx 3.13.0-24-generic #47-Ubuntu SMP Fri May 2 23:30:00 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux | 
| Please provide any additional information below. | 
| the reason: you only search for monitors with *mon pattern | 
| realtek chipsets and recent airmon-ng version use a new pattern: wlandmon | 
| here is a bugfix, i use for my version: | 
| '' | 
| defset_monitor_thread(self,monitor_card,mac_setting_exists,last_settings): | 
| #print 'starting new thread' | 
| status=str(commands.getoutput('airmon-ng start %s'%(monitor_card))) | 
| #print 'nStatus of airmon-ng start', monitor_card, ':', status,'n' | 
| if ('monitor mode enabled'instatus) or ('monitor mode vif enabled'instatus): #fix for ralink if | 
| monitor_interface_process=str(commands.getoutput('airmon-ng')) | 
| #print 'monitor_interface_process:', monitor_interface_process, 'n' | 
| if ('monitor mode enabled'instatus): | 
| regex=re.compile('mond',re.IGNORECASE) | 
| elif ('monitor mode vif enabled'instatus): | 
| regex=re.compile('wlandmon',re.IGNORECASE) #changed from mond to wlandmon | 
| interfaces=regex.findall(monitor_interface_process) | 
| print'available interfaces:', interfaces | 
| if(interfaces): | 
| self.monitor_interface=interfaces[0] | 
| else: | 
| self.monitor_interface=monitor_card | 
| print'setting self.monitor_interface to', self.monitor_interface | 
| variables.monitor_interface=self.monitor_interface | 
| self.interface_combo.setEnabled(False) | 
| variables.wps_functions.monitor_interface=self.monitor_interface | 
| self.emit(QtCore.SIGNAL('monitor mode enabled')) | 
| # Create Fake Mac Address and index for use | 
| mon_down=commands.getstatusoutput('ifconfig %s down'%(self.monitor_interface)) | 
| ifmac_setting_exists: | 
| variables.exec_command('macchanger -m %s %s'%(last_settings,self.monitor_interface)) | 
| else: | 
| variables.exec_command('macchanger -A %s'%(self.monitor_interface)) | 
| mon_up=commands.getstatusoutput('ifconfig %s up'%(self.monitor_interface)) | 
| foriterateinos.listdir('/sys/class/net'): | 
| ifstr(iterate) str(self.monitor_interface): | 
| os.chmod('/sys/class/net/'+self.monitor_interface+'/address',0777) | 
| variables.monitor_mac_address=reader('/sys/class/net/'+self.monitor_interface+'/address').strip() | 
| variables.wps_functions.monitor_mac_address=variables.monitor_mac_address | 
| else: | 
| print'problem occured while setting up the monitor mode of selected', monitor_card | 
 commented Jan 4, 2015 
Fern Wifi Cracker Mac Os X
| now intergrated in Fern-Wifi-Cracker 2.1 ( https://code.google.com/p/fern-wifi-cracker/issues/detail?id=97 ) | 
 commented Jan 21, 2015 

| Hello, I use Kali Linux in VMware Fusion (Mac OS X). When i choose the wlan0 (AWUSO36NH) on fern-wifi, a problem appears ... I'm trying to attack and WPA access. So i think Fern-Wifi Cracker doesn't work well with AWUS036NH. Sorry for my poor english. |