Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework
is a framework of serious penetration tools that can be explored easily from within it. This
powerful and simple tool can be used for everything from installing new add-ons to grabbing
a WPA handshake in a matter of seconds. Plus, it's easy to install, set up, and utilize.
cd ehtools
chmod +x install.sh
./install.sh
1. Start Ehtools Framework.
2. Open Ehtools Framework settings.
3. Select Uninstall Ehtools Framework
.
- Ehtools Framework only supports two OS.
Ehtools Framework only supports two
operating systems - Kali Linux and Parrot OS!
- Full root access and access to /root folder.
All ehtools files and folders will be copied to /root,
/bin and /etc system folders, to copy ehtools data to
your system Ehtools Framework needs full root access!
After executing install.sh it will be ask you
to select version of Ehtools Framework - PRO os LITE.
Select LITE if you did not buy Ehtools Framework PRO.
If you bought Ehtools Framework PRO, select PRO.
./install.sh
This key you can buy on the ehtools site! This key is used to activate
ehtools PRO enter it in the input field of the activation key in the file
install.sh and then you can install ehtools and use it only for educational
purposes! The key works only one week then it changes! You
should to have time to enter it before it is updated!
./install.sh
Also, we do not recommend to change the source code of ehtools because
it is very complex and you can mess up something and disrupt the framework!
To run Ehtools Framework you should
execute the following command.
ehtools
Most new Wi-Fi hacking tools rely on many of the same underlying
attacks, and scripts that automate using other more familiartools like
Aireplay-ng are often referred to as frameworks. These frameworks try
to organize tools in smart or useful ways to take them a step beyond
the functionality or usability of the original program.
An excellent example of this are programs that integrate scanning tools like
Airodump-ng, attacks like WPS Pixie-Dust, andcracking tools like Aircrack-ng to
create an easy-to-follow attack chain for beginners. Doing this makes the process
of using these tools easier to remember and can be seen as sort of a guided tour.
While each of these attacks is possible without the hand-holding, the result
can be faster or more convenient than trying to do so yourself.
An example of this we've covered is the Airgeddonframework, a wireless attack
framework that does useful things like automatingthe target selection process and
eliminating the time a user spends copying and pasting information between programs.
This savesvaluable time for even experienced pentesters but has the disadvantage of
preventing beginners from understanding what's happening "under the hood" of the attack.
While this is true, most of these frameworks are fast, efficient, and dead simple to
use, enabling even beginners to take on and disable an entire network.
The Ehtools Framework starts by merely typing the letter ehtools into a terminal window,
then it asks for the name of your network interfaces after the first run. It uses the names
you supply to connect to the tools needed to execute any attacks you select. Aside from that
initial input, the majority of the possible attacks can be performed merely by choosing the
option number from the menu. This means you can grab a network handshake or download a
new hacking tool like Pupy by just selecting from one of the menu options.
(ehtools)> if
Runs ifconfig and gives the names and
information about all network devices.
(ehtools)> 1
Enable wlan0.
(d1 disables it)
(ehtools)> 2
Enable wlan0mon.
(d2 disables it)
(ehtools)> 3
Randomize or set the MAC
address to a specific value.
(ehtools)> 7
View the public IP address your
computer is leaving on sites you visit.
(ehtools)> 19
Look up the physical address of a given IP
address to determine it's relative location.
(ehtools)> scan
Start an ARP scan on the network
to discover nearby devices.
(ehtools)> start
Start monitor mode on the
wireless network adapter.
(ehtools)> stop
Stop wireless monitor mode
on the network adapter.
Part of the fun of Ehtools Framework is how easy it is to add new tools to our arsenal.
We can select option 9 to access the list of tools in Ehtools Framework. From the next
menu, the tools are broken down into major categories, with options for managing the
installation of scripts. The options presented are:
1. Wi-Fi tools (tools for attacking wireless networks).
Wi-Fi options this is tools for attacking
wireless networks and network databases.
2. Remote access (tools for getting remote access to other devices and remotely managing them).
Remote access means tools for getting access
to other devices and remotely managing them.
3. Information gathering (collecting intelligence on people or website).
Information gathering tools, tools for
collecting intelligence on peaple or website.
4. Website tools (tools for exploiting or attacking sites).
Website tools, tools for exploiting or
attacking sites and network databases.
5. Other (a miscellaneous collection of other hacking tools)
Other tools this is collection
of miscellaneous hacking tools.
- You can also manage your installed tools by accessing option 6.
Ehtools application is an Ehtools Framework shortcut
that allows users to run Ehtools Framework just selecting
ehtools in the applications and clicking on it! I mean ehtools
application allows users to run ehtools via the application!
- There are two ways how to setup ehtools application.
The ehtools install.sh allows
you to create ehtools application.
There is an ehtools utility named ehtapp
(read more in Ehtools Utilities) that allows
users to configure ehtools application.
ehtapp -c
- More than 58 tools for pentesting installed by default.
More than 58 options installed by default
you can find in ehtools, this is tools such
as MetaSploit, Pupy and other tools!
- Password protection and config encryption.
In version 2.1.6 we added pasword protection, we added
it for users who think that his/her friend or parents will
turn into ehtools and will remove or destroy it. Only for this
people we created Ehtools Framework password protection.
- UX/UI impruvements for beginners.
It uses the names you supply to connect to the tools needed to
execute any attacks you select! Aside from that initial input, the majority
of the possible attacks can be performed merely by choosing the option number
from the menu. This means you can grab a network handshake or download a new
hacking tool like Pupy by just selecting from one of the menu options!
- ehtmod (ehtools modules) is an utility that adds permissions or the ability to control the Ehtools Framework modules.
ehtmod -h
Usage: ehtmod [option] <arguments>
-i, --install Install ehtools modules.
-t, --take <name> Take a new ehtools modules snapshot.
-r, --restore <name> Restore saved ehtools modules snapshot.
-d, --delete <name> Delete saved ehtools modules snapshot.
-u, --uninstall Uninstall ehtools modules.
-h, --help Give this help list.
- To install ehtools modules you need to execute the following command.
The ehtools install.sh will ask you to "install" or "not
install" ehtools modules and if you answered "not install" and
want to install them, run the following command!
ehtmod -i
EMS is a saved ehtools modules data, you can
take it using the ehtmod utility and restore it.
- To take ehtools modules snapshot you need to execute the following command. You need to enter the name of the ehtools modules snapshot you want to take (example: snapshot1).
ehtmod -t snapshot1
EMR is an operation that removing modules and restoring it from
the saved ehtools modules snapshot, you can restore it using the
ehtmod utility but ESR will remove all your old ehtools modules data!
- To restore ehtools modules snapshot you need to execute the following command. You need to enter the name of the saved ehtools modules snapshot (example: snapshot1).
ehtmod -r snapshot1
- ehtkey (ehtools key) is an utility that allows you to change your ehtools config key (ehtools config/boot key) and rewrite /etc/ehtools/.config.
ehtkey
Usage: ehtkey [option] <arguments>
-c, --change <old_key> <new_key> Change ehtools config key.
-h, --help Give this help list.
- To change ehtools config key you need to execute the following command. You need to enter your old ehtools config key (example: 1001) and after this enter your new ehtools config key (example: 2002).
ehtkey -c 1001 2002
- ehtapp (ehtools application) is an utility that allows you to configure ehtools application, for example creating ehtools desktop application.
ehtapp -h
Usage: ehtapp [option] <arguments>
-c, --create Create ehtools application.
-d, --desktop <operation> Create/remove ehtools desktop application.
-r, --remove Remove ehtools application.
-h, --help Give this help list.
- To create ehtools application you need to execute the following command.
The ehtools install.sh will ask you to "create" or
"not create" ehtools application and if you answered "not
create" and want to create it, run the following command!
ehtapp -c
- To create ehtools desktop application you need to execute the following command.
ehtapp -d create
- epasswd (ehtools password changer) is an utility that allows you to change your ehtools login and password or ehtools root password.
epasswd
- To change ehtools login and password enter your old ehtools login (example: ehtools) and your old ehtools password (example: sloothe).
(login)> ehtools
(password)> sloothe
- After this enter your new ehtools login (example: admin) and your new ehtools password (example: 1234).
((new)login)> admin
((new)password)> 1234
- Congratulations, you have successfully changed ehtools login and password!
In no case do not forget this password, it will not
be restored and you will need to reinstall ehtools!
- To cange root password, login to epasswd as ehtools root.
epasswd
(login)> root
- After this enter your old ehtools root password (default: toor).
(password)> toor
- After this enter your new ehtools root password (example: 1234).
((new)password)> 1234
- Congratulations, you have successfully changed ehtools root password!
In no case do not forget this password, it will not
be restored and you will have to reinstall ehtools!
- Do this using install.sh.
Create login and password using install.sh
(example: login: ehtools, password: sloothe)
- Do this when you are going to exit from ehtools.
When you are going to exit framework,
exit with shortcuts - 0 or exit.
- Do not do this when you are going to exit from ehtools.
Do not just close ehtools window and
do not exit from the Ehtools Framework
using Ctrl-C or other exit signals!
Usage of the Ehtools Framework for attacking targets without prior mutual consent is illegal.
It is the end user's responsibility to obey all applicable local, state, federal, and international laws.
Developers assume no liability and are not responsible for any misuse or damage caused by this program.