Information Technology Reference
In-Depth Information
wireless technology encourages digital eavesdropping. The World Wide Wardrive
( http://www.worldwidewardrive.org ) and Wigle ( http://www.wigle.net ) Websites are
obvious illustrations. Wigle maintains a database of nearly four million active wire-
less networks in its online database. The World Wide Wardrives are network discov-
ery contests.
In this chapter we have sought to identify some of the wireless insecurities that
loom largest in today's increasingly wireless world. To the inattentive, the deploy-
ment of wireless can create the loss of trade secrets, the loss of personal privacy, theft
of services, and unwitting participation in information warfare. For the attentive, the
watch phrase must be “danger lurks within.”
Appendix A: Wireless Security Utilities by Operating
System and Function
Utility name
OS
Use
WEPcrack
Any platform (if Perl is available)
Finding WEP keys
AirSnort
Linux, Windows
Finding WEP keys
dwepcrack
BSD
Finding WEP keys
reinj
BSD
Packet Injection tool
WEPWedgie
Linux
Packet Injection tool
wep_tools
Linux
Finding WEP keys
asleap
Linux, Windows
Finding LEAP passwords
Leapcrack
Any platform (if Perl is available)
Finding LEAP passwords
leap
Linux
Finding LEAP passwords
L0phtcrack
Windows
Password cracking
ettercap
Linux
fata_jack
Linux
Denial of service
macfld.pl
Linux
Denial of service
dinject
Linux
Denial of service
airjack
Linux
Drivers for MITM, DoS, etc.
File2air
Linux
Denial of service
Void11
Linux
Denial of service
omerta
Linux
Denial of service
HostAP
Linux
Software Access Point
HermesAP patch
Linux
Software Access Point
WPA Cracker
Linux
WPA-PSK password cracking
FakeAP
Linux, BSD
Random AP frame generation
WepAttack
Linux
Enhanced WEP cracking
aircrack
Linux
Enhanced WEP cracking
chopchop
Linux
Packet by packet decryption
chopper
Linux
POC WEP cracker
coWPAtty
Linux
WPA cracker
Search WWH ::




Custom Search