Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework provides serious penetration tools that can be explored easily from within it. This powerful and simple tool can be used for everything from installing new add-ons to grabbing a WPA handshake in a matter of seconds. Plus, it's easy to install, set up, and utilize.
How to Install Ehtools
cd ehtools chmod +x install.sh ./install.sh
After executing install.sh , it will prompt you to select the version of Ehtools Framework - PRO or LITE. Select LITE if you did not buy Ehtools Framework PRO. If you bought Ehtools Framework PRO, select PRO.
What version of Ehtools Framework do you want to install?(pro/lite):If you did not buy Ehtools Framework PRO, select LITE! If you bought Ehtools Framework PRO, select PRO!(version)>
If you select Ehtools Framework PRO, you will need to activate it with your Ehtools Activation Key, issued after buying it on the Ehtools site. If you have the Ehtools Activation Key, read the following instructions.
How to activate ehtools PRO
For just a dollar, get yourself the activation key on the Ehtools site. To activate ehtools PRO, type/copy and paste the key in the input field of the activation key in the file install.sh and enter. Thereafter,you can install ehtools and use it only for educational purposes.
WARNING: The issued key is only valid for a week, after which, it changes. Hence, you need to use it to activate the tool within that period before it gets updated.
Enter the ehtools activation key you bought on the ehtools site.(activation_key)>
We also do not recommend changing the source code of ehtools because it is very complex, and you could mess up something and disrupt the framework.
WARNING: We do not recommend changing ehtools source code because you could disrupt the framework!
How to Uninstall Ehtools
WARNING: Do not uninstall ehtools Pro if there is a need to reinstall it again as you will be forced to buy it one more time!
Most new Wi-Fi hacking tools rely on many of the same underlying attacks and scripts that automate using other more familiar tools, like Aireplay-ng are often referred to as frameworks. These frameworks try to organize tools in smart or useful ways to take them a step beyond the functionality or usability of the original program.
An excellent example of this are programs that integrate scanning tools like Airodump-ng, attacks like WPS Pixie-Dust, and cracking tools like Aircrack-ng to create an easy-to-follow attack chain for beginners. Doing this not only makes the process of using these tools easier to remember but also can be seen as a sort of a guided tour. While each of these attacks is possible without the hand-holding, the result can be faster or more convenient than trying to do so yourself.
An example of this we've covered is the Airgedd-on-framework, a wireless attack framework that does useful things like automating the target selection process and eliminating the time a user spends copying and pasting information between programs. This saves valuable time for even experienced pentesters, but has the disadvantage of preventing beginners from understanding what's happening "under the hood" of the attack. While this is true, most of these frameworks are fast, efficient, and dead simple to use, enabling even beginners to take on and disable an entire network.
UX/UI improvements for beginners
The Ehtools Framework starts by merely typing the letter ehtools or eht into a terminal window, then it prompts for the name of your network interfaces after the first run. It uses the names you supply to connect to the tools needed to execute any attacks you select. Aside from the initial input, majority of the possible attacks can be performed merely by choosing the option number from the menu. This means you can grab a network handshake or download a new hacking tool like Pupy by just selecting from one of the menu options.
Using Basic Networking Tools
To begin, we can access data about the network we're currently connected to, as well as any network interfaces, from the main menu. Here, we can find local information by typing l to pull up local IP information, as seen below.
This allows us to do things like scanning the network for other devices. This part of Ehtools Framework gives us better visibility on a network and situational awareness of what devices are around us. The various information can be broken down as follows:
INFO: Runs ifconfig and gives the names and information about all network devices.
INFO: Enables wlan0.
(d1 disables it)
INFO: Enables wlan0mon.(d2 disables it)
INFO: Randomizes or sets the MAC address to a specific value.
INFO: Views the public IP address your computer is leaving on sites you visit.
INFO: Looks up the physical address of a given IP address to determine its relative location.
INFO: Starts an ARP scan on the network to discover nearby devices.
INFO: Starts monitor mode on the wireless network adapter.
INFO: Stops wireless monitor mode on the network adapter.
Installing New Tools
Part of the fun aspect of Ehtools Framework is how easy it is to add new tools to our arsenal. To demonstrate this, let's download Pupy, a Python-based RAT designed to take control of other computers on the network. We can select option 9 to access the list of tools in Ehtools Framework.
INFO: Our framework has more than 100 packages in ehtools archive (on server, the archive is 2.3 Tb)!
From the next menu, the tools are broken down into major categories, with options for managing the installation of scripts. The options presented are:
1. Wi-Fi tools (tools for attacking wireless networks).
INFO: Wi-Fi options are tools for attacking wireless networks and network databases.
2. Remote access (tools for getting remote access to other devices and remotely managing them).
INFO: Remote access means getting access to other devices and remotely managing them.
3. Information gathering (collecting intelligence on people or websites).
INFO: Information gathering tools are used for collecting intelligence on people or websites.
4. Website tools (tools for exploiting or attacking sites).
INFO: Website tools are used for exploiting or attacking sites and network databases.
5. Other (a miscellaneous collection of other hacking tools)
INFO: Other tools is a collection of miscellaneous hacking tools.
You can also manage your installed tools by accessing option 6. To download Pupy, we'll go to option 2, which is remote access. Here, we will see a list of different tools for remote access, and we can select option 3 for Pupy.
Using Ehtools’s Quick Access
INFO: Ehtools quick access is when you run ehtools. For example, ehtools -r to remove ehtools!
Run it to open quick access menu:
Run it to uninstall ehtools:
Run it to make handshake:
Run it to open WPS menu:
INFO: For these shortcuts, you will not need to enter your ehtools password!
Why Ehtools Framework?
It has more than 58 tools for pentesting installed by default
INFO: More than 58 options installed by default are at your disposal when using the ehtools framework. The tools are MetaSploit,WireShark,etc., to mention a few.
Password protection and config encryption
INFO: In version 2.1.6, we added password protection for users who suspect their frameworks can be corrupted or uninstalled by third parties such as friends/family. The password protection layer only seeks to protect such users of the Ehtools framework.
Easy to learn, and hence the best framework for beginners
INFO: Ehtools Framework's TUI is very simple for beginners. You can easily initiate an attack on the local network by choosing an option from the main menu. It is very simple, is not it?
UX/UI improvements for beginners
INFO: It uses the names you supply to connect to the tools needed to execute any attacks you select. Aside from that initial input, majority of the possible attacks can be performed by merely choosing the option number from the menu. This means you can grab a network handshake or download a new hacking tool like Pupy by selecting from one of the menu options.
You can install more than 100 tools from ehtools or ehtoolslite
INFO: Our framework has more than 100 packages in ehtools archive (on server, this archive is 2.3 Tb)!
Full root access and access to /root folder
All ehtools files and folders will copy to /root,/bin and /etc system folders. To copy ehtools data to your system, root access is required!
Bourne-again shell and Gnome-terminal shell
Bourne-again shell and Gnome-terminal shell is needed for ehtools TUI. Without the Gnome-terminal shell, modules such as eht1, eht2,etc.will not work!
Good internet connection for server support (applies to ehtools PRO only)
The server support for ehtools PRO is one of the system requirements. It is essential for collecting information about ehtools crashes, and also for checking the product status such as you bought ehtools/you did not buy ehtools.
More about tool: https://github.com/entynetproject/ehtools