15 Free wifi intrusion hack security Test tool

Source: Internet
Author: User

Here are 15 free (nearly free) WiFi network intrusion testing tools. These tools will help you find rogue APs, weak wi-fi Password and other security risks, before the hackers to make up the loopholes. Vistumbler Scanner Kismet is an open source WiFi scanner, packet sniffer and intrusion policy system that can run on Windows, Mac OSX, Linux, and BSD. Kismet can display AP details, including hidden SSIDs, capture raw wireless packets, and analyze data into tools such as Wireshark, tcpdump, and more. In a Windows environment, Kismet can only work with the Cace Airpcap wireless network adapter, which is limited by the driver. But on Mac OSX and Linux, Kismet can be compatible with many wireless cards.
Third,KismetKismet is an open source WiFi scanner, packet sniffer and intrusion policy system that can run on Windows, Mac OSX, Linux, and BSD. Kismet can display AP details, including hidden SSIDs, capture raw wireless packets, and analyze data into tools such as Wireshark, tcpdump, and more. In a Windows environment, Kismet can only work with the Cace Airpcap wireless network adapter, which is limited by the driver. But on Mac OSX and Linux, Kismet can be compatible with many wireless cards.
Third, WiFi Analyzewifi Analyzer is a free Android app that can be used to search for AP hotspots on Android tablets and Android phones. WIFI Analyzer can display AP specific information on the 2.4GHz band, as well as devices on some 5G bands. You can send the AP information list (XML file) to the mailbox or other programs, or to the screen, WiFi Analyzer can graphically display the signal strength of each channel, history, and frequency of use, WiFi Analyzer itself is a good signal strength tester.
Four, WEP, WPA/WPA2 Hack Tool: aircrack-There are many tools that NG can use to hack WiFi encryption, and it's all about using a WEP security vulnerability or brute-force dictionary attack to crack WPA/WPA2 PSK password. WPA2 AES/CCMP Encryption is still a relatively safe option. If you use WPA2 PSK mode, your password length is preferably 13-bit or more mixed characters. Before your Wi-Fi network is compromised or "rubbed off", it's a good idea to attack yourself with a hack tool first. Aircrack-ng is an open-source wep/wpa/WPA2 PSK hack tool that can run on Windows, Mac OS X, Linux, and OpenBSD. Can be downloaded to a VMware image file or live CD file.
Five, cloud cracker as the name implies, cloud Cracker is a commercial online password deciphering service (cloud hack), every 20 minutes service charges 17 dollars, in addition to crack WPAThe/WPA2 PSK password can also be used to decipher hashed encrypted password-protected documents. Cloudcracker's dictionary has 300 million passwords, powerful computing power, you just need to be cracked wpa/WPA2 handshake file or pwdump file upload, the rest will be given to the cloud cracker.
Liu, Freeradius-WPE Although enterprise-grade WPA based on the 802.1X authentication protocol/WPA2 is a bit more secure than PSK, but there are still security holes. The Freeradius-wpe tool can help you understand attacks against your corporate WiFi network and better protect your network. freeradius-WPE is a patch pack for open source software Freeradius that can launch a man-in-the-middle attack on a WiFi network using 802.1X authentication
Vii. Reaver If you are using a wireless router, you need to be aware of a security vulnerability found at the end of last year: Many router vendors provide WPS (one-click Authentication mode, user-friendly router device connection authentication) PIN code can be cracked within a few hours. Reaver is such a tool, Reaver is a Linux program, can be in 4-10 hours of violence in the wireless router's WPS PIN code and wpa/WPA2 PSK password. Reaver also offers a handy, dedicated hardware solution: Reaver Pro, which has a graphical web operator interface.
Eight, wifish Finderwifi hackers often use one of the means is to assume the fake AP hotspot, which is called "Evil twin AP" or "Wireless honeypot." When someone mistakenly links to this AP, the hacker can capture any e-mail and FTP link data that the user uses, and even access the user's shared files. The fake AP tool can also use fake DNS caches to display fake hotspots or site landing pages to get user login accounts. The Wifish Finder is an open source Linux program that can passively capture wireless network data and proactively detect and discover vulnerable wireless clients. The Wifish Finder can generate a list of network names for client requests and detect the security types of these requested networks.
Nine, Wireless honeypot: Jasagerjasager (based on Karma) is a Linux firmware that provides a set of Linux tools to discover the security vulnerabilities of wireless clients, similar to the Wifish Finder, but the biggest difference is that it can be used for wireless honeypot attacks. The Jasager can be run on the FON or WiFi Pineapple router. It can configure a soft AP to generate the SSID of a nearby wireless client search, as well as provide DHCP, DNS, and HTTP services to wireless clients. Where the HTTP server can speak network access requests directed to a specific Web site. Jasager can also capture and display the plaintext pop, FTP, or HTTP login information for any victim. Jasager has a web-based command-line interface. The
10, Fake apfake APS run on Linux and BSD systems and can generate thousands of phishing APS by emitting SSID frames. Fake APs can be used by attackers to confuse IT staff or intrusion policy systems, but can also be used by ordinary consumers to confuse street hackers. The
11, wifidenumwifidenum (WiFi drive counter) is a Windows program that can help identify wireless network device driver vulnerabilities and protect against attacks that exploit wireless vulnerabilities. Ability to scan limited or wireless workstation networks, mobile phone wireless card driver details, and identify potential security vulnerabilities.
12, Nmap many old wired network eavesdropping and attack tools can actually be used in wireless networks, such as Nmap, which is an open source TCP /IP scanner, which can be used to discover hosts and clients on the network, NMAP can run on Windows, Linux, Mac OS x, and has a graphical interface and a command-line interface. Nmap can report the operating system information on the network, the type of service provided, and * * * *filter or firewall type, etc., to help find insecure hosts or ports.
13, Cain and Abelcain and Abel are password recovery, cracking, and sniffing tools on windows that can be used to show how to sniff a password from a network.
14, Firesheep Fire sheep Fire Sheep Firesheep is a Firefox plugin capable of HTTP session hijacking, that is, bypass hijacking. The fire sheep can monitor the user's Web login information and exchange the login cookie in the network, that is, as long as the fire sheep scan to your website login cookie, the computer running the fire sheep can login to the same website as you, such as online banking, online shop, social network and web e-mail, without entering the password account.
XV, BackTrack

15 Free wifi intrusion hack security Test tool

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.