Hi, guys you might looking for the best "Wireless hacking tools''. Here is some list of Tools
.1. Kismet: It is a network detector, packet sniffer and intrusion detection system for 802.11 wireless LANs. Kismet will work with any wireless card which support raw monitoring mode, & can sniff 802.11a, 802.11b, & 802.11g traffic. Kismet also includes basic wireless IDS(Intrusion detection system) features such as detecting active wireless active wireless sniffing programs including netsumbler as well as a no of wireless attacks.
2. NetStumbler: Netstumbler is the best known Windows tool for finding open wireless access points ("wardriving").They also distribute a WinCE version for PDAs and such named Ministumbler. The tool is currently free but Windows-only and no source code is provided. It uses a more active approach to finding WAPs than passive sniffers such as Kismet or KisMAC.
3. Aircrack: The fastest available WEP/WPA cracking tool
Aircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking. It can recover a 40 through 512-bit WEP key once enough encrypted packets have been gathered. It can also attack WPA 1 or 2 networks using advanced cryptographic methods or by brute force. The suite includes airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), and airdecap (decrypts WEP/WPA capture files).
4. Airsnort: 802.11 WEP Encryption Cracking Tool
AirSnort is a wireless LAN (WLAN) tool that recovers encryption keys. It was developed by the Shmoo Group and operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered. You may also be interested in the similar Aircrack.
5.KisMac: A A GUI passive wireless stumbler for Mac OS X
This popular stumbler for Mac OS X offers many of the features of its namesake Kismet, though the codebase is entirely different. Unlike console-based Kismet, KisMAC offers a pretty GUI and was around before Kismet was ported to OS X. It also offers mapping, Pcap-format import and logging, and even some decryption and deauthentication attacks.
No comments:
Post a Comment