19 November 2019

EHTools Framework: A Framework Of Serious Penetration Tools And Wi-Fi Pentesting


About EHTools Framework
   Wi-Fi tools keep getting more and more accessible to beginners, and the EHTools Framework is a framework of serious penetration tools that can be explored easily from within it. This powerful and simple tool can be used for everything from installing new add-ons to grabbing a WPA handshake in a matter of seconds. Plus, it's easy to install, set up, and utilize.

Why choice EHTools Framework?

   Lots of pentesting tools installed by default: More than 58 options installed by default you can find in EHTools Framework such as Metasploit FrameworkWireShark and other tools!

   Password protection and config encryption: In version 2.1.6 the authors added pasword protection for users who think that his/her friend or parents will turn into EHTools Framework and will remove or destroy it. Only for this people the authors create password protection for EHTools Framework 🙂


   Easy in learning and this is the best framework for beginners: EHTools Framework's TUI is very simple for beginners, you can start attack on the local network by choosing an option from main menu. It is very simple, is not it?


   UX/UI impruvements for beginners: It uses the names you supply to connect to the tools needed to execute any attacks you select! Aside from that initial input, the majority of the possible attacks can be performed merely by choosing the option number from the menu. This means you can grab a network handshake or download a new hacking tool like Pupy by just selecting from one of the menu options!


   More than 100 tools you can install from EHTools Framework or Lite: Our framework has more than 100 packages in EHTools Framework archive (on server this archive: 2.3 TB)!


System requirements for EHTools Framework

   Full root access and access to /root folder: All EHTools Framework files and folders will copy to /root/bin and /etc system folders, for copy ehtools data to your system needed root access!

   Bourne-again shell and Gnome-terminal shell needed for EHTools Framework GUI and also without Gnome-terminall shell modules such as (eht1, eht2 and etc.) will not work!


   Good internet connection for server support (only EHTools Framework Pro): The server support for ehtools PRO is one of system requirements, it is needed for collect information about EHTools Framework crashes and it is also needed for check product status such as (you bought ehtools/you did not buy ehtools)


EHTools Framework Installation

   To uninstall EHTools Framework, enter this command: ehtools -r

How to activate EHTools Framework Pro
   This key you can buy on the EHTools website for one dollar! This key is used to activate EHTools Framework PRO enter it in the input field of the activation key in the file install.sh and then you can install EHTools Framework and use it only for educational purposes!

   WARNING: The key works only one week then it changes!

You need to have time to enter it before it is updated!

Enter your ehtools activation key!
You can buy it on the ehtools site!
(activation_key)>

   Also, the the authors do not recommend to change the source code of ehtools because it is very complex and you can mess up something and disrupt the framework!


Selecting version of EHTools Framework

   After executing install.sh it will be ask you to select version of EHTools Framework: Pro or Lite.
   Select Lite if you did not buy EHTools Framework Pro. If you bought Ehtools Framework pro license key from EHTools website, select Pro.

What version of Ehtools Framework do you want to install?(pro/lite):
If you did not buy Ehtools Framework PRO, select LITE!
If you bought Ehtools Framework PRO, select PRO
(version)>


   If you select EHTools Framework Pro, you will need to activate it with your EHTools Framework Activation Key that you need to bought on the EHTools website. If you have EHTools Framework Activation Key, read the following instructions.


Attacking Frameworks

   Most new Wi-Fi hacking tools rely on many of the same underlying attacks, and scripts that automate using other more familiar tools like Aireplay-ng are often referred to as frameworks. These frameworks try to organize tools in smart or useful ways to take them a step beyond the functionality or usability of the original program.

   An excellent example of this are programs that integrate scanning tools like Airodump-ng, attacks like WPS Pixie-Dust, and cracking tools like Aircrack-ng to create an easy-to-follow attack chain for beginners. Doing this makes the process of using these tools easier to remember and can be seen as sort of a guided tour. While each of these attacks is possible without the hand-holding, the result can be faster or more convenient than trying to do so yourself.


   An example of this the authors have covered is the Airgeddon, a wireless attack framework that does useful things like automating the target selection process and eliminating the time a user spends copying and pasting information between programs. This saves valuable time for even experienced pentesters but has the disadvantage of preventing beginners from understanding what's happening "under the hood" of the attack. While this is true, most of these frameworks are fast, efficient, and dead simple to use, enabling even beginners to take on and disable an entire network.


UX/UI impruvements for beginners

   The EHTools Framework starts by merely typing the letter ehtools or eht into a terminal window, then it asks for the name of your network interfaces after the first run. It uses the names you supply to connect to the tools needed to execute any attacks you select. Aside from that initial input, the majority of the possible attacks can be performed merely by choosing the option number from the menu. This means you can grab a network handshake or download a new hacking tool like Pupy by just selecting from one of the menu options.

Use basic networking tools

   To begin, the we can access data about the network they're currently connected to, as well as any network interfaces, from the main menu. Here, we can find local information by just typing l to pull up local IP information, as seen below.

   This allows us to do things like scan the network for other devices. This part of EHTools Framework gives us better visibility on a network and situational awareness of what devices are around us. The various information can be broken down as follows:
  • if: To run ifconfig and gives the names and information about all network devices
  • 1: Enables wlan0
  • d1: Disables wlan0
  • 2: Enables wlan0mon
  • d2: Disables wlan0mon
  • 3: Randomize or set the MAC address to a specific value
  • 7: View the public IP address your computer is leaving on sites you visit
  • 19: Look up the physical address of a given IP address to determine it's relative location
  • scan: Start an ARP scan on the network to discover nearby devices
  • start: Start monitor mode on the wireless network adapter
  • stop: Stop wireless monitor mode on the network adapter
Use EHTools Framework quick access
   Run it to open quick access menu: ehtools -o
   Run it to update EHTools Framework: ehtools -u
   Run it to remove EHTools Framework: ehtools -r
   Run it to make handshake: ehtools -h
   Run it to open WPS menu: ehtools -w

Install new tools on EHTools Framework
   Part of the fun of Ehtools Framework is how easy it is to add new tools to our arsenal. To demonstrate this, let's download Pupy, a Python-based RAT designed to take control of other computers on the network. We can select option 9 to access the list of tools in EHTools Framework.

   From the next menu, the tools are broken down into major categories, with options for managing the installation of scripts. The options presented are:

  • 1: Wi-Fi tools (tools for attacking wireless networks and network databases)
  • 2: Remote access (tools for getting remote access to other devices and remotely managing them)
  • 3: Information gathering (collecting intelligence on people or website)
  • 4: Website tools (tools for exploiting or attacking sites)
  • 5: Other (a miscellaneous collection of other hacking tools)
   You can also manage your installed tools by accessing option 6. To download Pupy, we'll go to option 2, which is remote access. Here, we will see a list of different tools for remote access, and we can select option 3 for Pupy.

About EHTools Framework server support
   Server support for ehtools Pro is very important, as all error reports are sent to it in order to improve and fix vulnerabilities and bugs!

   COUNCIL: Make a good internet connection for EHTools Framework, to help EHTools Framework access to server!

   If in consequence of bad Internet connection EHTools Framework will not be able to communicate with the server then the framework will not start because of access denial and due to a validation error for check ehtools bought or not bought!

   If there is the bad internet connection, EHTools Framework will say you this:
[*] There is no connection!

   If you did not buy EHTools Framework, EHTools Framework will say you this:
[*] Failed to open session for ehtools!

How to protect EHTools Framework with password

   Do it with install.sh: Create login and password from install.sh.
   Defaults is login: ehtools, password: sloothe.

   Do it when you are going to exit from EHTools Framework, exit with shortcuts:
0 or exit.

   Do not do it when you are going to exit from EHTools Framework. WARNING: Do not just close EHTools Framework window!

Terms of use
   This tool is only for educational purposes only.
   Use this tool wisely and never without permission.
   The authors are not responsible for anything you do with this tool.


what is spyware

No comments:

Post a Comment