Oliver Jones

Assessing a home Wi-Fi router with Kali and fern-wifi-cracker (with permission)

📅 Published: August 12, 2025 👤 Author: Oliver Jones

Today I'm doing an assessment on my girlfriend's Wi-Fi router (with permission of course). I'm going to be using Kali Linux and fern-wifi-cracker to capture a WPA handshake and test a wordlist against it.

Prerequisites

Adapter issues I hit (and the fix)

I had some issues at first with my Wi-Fi card, but ran the following commands and that fixed it.

# delete the monitor iface
sudo ip link set mon0 down
sudo iw dev mon0 del

# replace phy1 with whatever you saw in `iw dev`
sudo iw phy phy1 interface add wlan0 type managed
sudo ip link set wlan0 up

# kill existing iface
sudo airmon-ng check kill
sudo iw dev wlan0 interface add wlan0mon type monitor
sudo ip link set wlan0mon up

# sanity
iw dev
iwconfig           # wlan0mon should say Mode:Monitor
sudo airodump-ng wlan0mon

# launch fern as root
sudo fern-wifi-cracker

Point and click in Fern

Once the GUI appears, select your wireless card:

Then, start scanning for access points:

Once the access points start to load, click on Wi-Fi WPA to load the attack panel:

Select the target and set your wordlist for brute-forcing passwords.

Once you've set these options, click on Wi-Fi Attack:

Fern will start probing the access point to find the MAC address of connected devices, then attempt to deauthenticate those devices in order to capture the handshake upon reconnecting. From the target device's perspective, it will disconnect and reconnect. That can look like normal network hiccups, but it's your deauth doing its thing, so do this only with permission.

Once it successfully captures the handshake, it will start trying passwords from the wordlist. Depending on signal strength and the list, you might need more than one try.

If the password is in the list, Fern will find it and store it in its database.

Notes

Lessons learned

Only test networks you own or have explicit permission to assess. Capturing handshakes and forcing reconnects on someone else’s network is illegal. Document what you do and keep it tight.