Statistics
Total online: 1 Guests: 1 Users: 0
|
Top 5 Wireless Tools
1. Kismet : A powerful wireless sniffer
Kismet is an console (ncurses) based 802.11 layer2 wireless network
detector, sniffer, and intrusion detection system. It identifies
networks by passively sniffing (as opposed to more active tools such as NetStumbler),
and can even decloak hidden (non-beaconing) networks if they are in
use. It can automatically detect network IP blocks by sniffing TCP,
UDP, ARP, and DHCP packets, log traffic in Wireshark/TCPDump compatible
format, and even plot detected networks and estimated ranges on
downloaded maps. As you might expect, this tool is commonly used for wardriving.
2.
NetStumbler : Free Windows 802.11 Sniffer
Netstumbler is the best known Windows tool for finding open wireless
access points ("wardriving"). They also distribute a WinCE version for
PDAs and such named Ministumbler.
The tool is currently free but Windows-only and no source code is
provided. It uses a more active approach to finding WAPs than passive
sniffers such as Kismet or KisMAC.
3. Aircrack : The fastest available WEP/WPA cracking tool
Aircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking. It
can recover a 40 through 512-bit WEP key once enough encrypted packets
have been gathered. It can also attack WPA 1 or 2 networks using
advanced cryptographic methods or by brute force. The suite includes
airodump (an 802.11 packet capture program), aireplay (an 802.11 packet
injection program), aircrack (static WEP and WPA-PSK cracking), and
airdecap (decrypts WEP/WPA capture files).
4. Airsnort : 802.11 WEP Encryption Cracking Tool
AirSnort is a wireless LAN (WLAN) tool that recovers encryption keys. It was developed by the Shmoo Group
and operates by passively monitoring transmissions, computing the
encryption key when enough packets have been gathered. You may also be
interested in the similar Aircrack.
5.
KisMAC : A A GUI passive wireless stumbler for Mac OS X
This popular stumbler for Mac OS X offers many of the features of its namesake Kismet,
though the codebase is entirely different. Unlike console-based Kismet,
KisMAC offers a pretty GUI and was around before Kismet was ported to
OS X. It also offers mapping, Pcap-format import and logging, and even
some decryption and deauthentication attacks.
|
|
|