What's new

Closed Wireless hàcking tools

Status
Not open for further replies.

iPixx

Forum Veteran
Joined
Sep 18, 2017
Posts
2,580
Reaction
1,670
Points
781
Aircràck-ng

Wireless Hàcking Tools are those hàcking tools which are used to häck into a wireless network which is usually more susceptible to security threats. One must also ensure that the network is completely secured against hàcking or other malware. The list of wireless hàcking tools which would be discussed now can be used to do a Penetration Testing for a Wireless Network. This is an intentional attack on a network to detect security vulnerabilities by accessing its data and functionality.


It is a software suite specially designed for a wireless network and which operates under both the Windows and the Linux Operating System. Aircräck-ng consists of a packet sniffer, WPA cràcker, and analysis tool and a detector for the wireless Local Area Networks (802.11). The best part of this software suit is one need not install it to use it. It is a collection of files which can be easily used with a command prompt.

There have been many wireless häcking tools exposed in recent past. When a häcker hàcks a wireless network, it is supposed to defeat the Wireless network’s security devices. The Wi-Fi networks i.e. the Wireless LANs are more exposed to the security threats from a hàcker while compared to that of a wired network. While hàckers are always more than ready to häçk especially if there are weaknesses in a computer network, hàcking is often a tedious and complicated procedure.


Kismet
Kismet is a wireless detector system which detects possible intrusion to an 802.11 layer2 wireless network, it is also a sniffer. There is certain plug-in supported by Kismet which enables sniffing media like DECT. It also has the capacity to infer whether a nonbeaconing network is present or not via the data traffic in the network and a network is identified by this tool by collecting data packets passively, detecting hidden and standard named networks.


InSSIDer
InSSIDer is a network scanner which is used in a Wi-Fi network for the Windows Operating System as well as the Apple OS X. It has been developed by MetaGeek, LLC. It is used to collect information from both software and a wireless card and is useful in selecting the availability of the best wireless channel. It also shows those Wi-Fi network channels which overlap with each other.


KisMAC
It is a discovery tool for a wireless network for the Mac OS X operating system. It has many features which are similar to another wireless detector tool called Kismet. This tool is meant for expert network security personnel and is not very user-friendly for the beginners


NetStumbler
NetStumbler is a häçking tool which is used in the Windows Operating system and comes with add-ons which are used to häçk a wireless network. It has the capability to convert a WIFI enabled laptop on Windows OS into a network detector in an 802.11 WLAN.


WepLab
The WebLab is a tool which teaches about the weaknesses of a WEP, how a WEP works and how it is used to break a wireless network which is WEP protected. It has the features of a WEP Security Analyzer.


Airjack
It is a powerful tool for packet injection in an 802.11 wireless network and is very useful as it has the capability to send in forged de-authentication packets. This feature is usually used by a häçker to bring down a network.

Firesheep
In order to log into a website, a user has submitted details like his or her username and password. The server validates these data and sends back a “cøøkíé”. The websites usually encrypt the password, however, does not encrypt other details which leave the cøøkíé exposed to häçking threats which are also known as HTTP session hijacking. Firesheep has a packet sniffer which can intercept the cøøkíés which are encrypted from Social Media sites like Twitter and Facebook and comes with the Firefox web browser. Firesheep is available for both the Windows and Mac OS X operating system. It would also run on the Linux platform in the new future.


KARMA
KARMA is an attack tool which takes the advantage of the probing techniques that is used by used by a client of a WLAN. The station searches for a Wireless LAN in the list of preferred network and it is then that it makes the SSID open for an attacker who is listening. The disclosed SSID is used by KARMA for impersonation of a valid WLAN and attracts the station to the listening attacker.


Thank you again hahahahahaha
 
Status
Not open for further replies.

Similar threads

Back
Top