Check free testing tools required for wireless security

Source: Internet
Author: User
Tags password protection freeradius firesheep

Once your wireless network is attacked, it will be easier to understand the Wi-Fi security vulnerability and the protective measures you should take. CIO. COM, a foreign website, introduced 15 free Wi-Fi security testing tools to help us find malicious access points, weak Wi-Fi passwords, and other security vulnerabilities. This ensures that protection is complete before being attacked.

 


15 free Wi-Fi security testing tools

1. Vistumbler | Local download

Vistumbler is a new open-source scanning program. Vistumbler can search for all wireless networks nearby you and add information on it, such: active, MAC address, SSID, signal, channel, authentication, encryption, and network type. It can display basic AP information, including precise authentication and encryption methods, and even the SSID and HTTP. Vistumbler also supports GPS devices to connect to different local Wi-Fi networks and output data in other formats.


Vistumbler
Ii. Kismet | Local download


 

Kismet is an open-source wireless network detection, sniffing, and interference tool that works on the second layer of the 802.11 protocol. It can work on all wireless networks that support raw monitoring. Attackers can sniff protocol packages including 802.11b, 802.11a, and 802.11 GB.


Kismet

3. Wifi Analyzer | Local download

Wifi Analyzer is a free Android app. You can find an AP on a mobile terminal of the Android platform. It lists all the details of the ap in the GHz channel and supports other devices in the 5 GHz channel. You can also share AP details in XML format by email or other applications or screenshots. It is visually displayed based on the channel signal strength, usage, and signal distance.


Wifi Analyzer

Iv. WEP password and WPA/WPA2 cracking: Aircrack-ng

 

For wireless hackers, Aircrack-ng is an indispensable wireless attack tool. Aircrack-ng is a tool used to crack wireless 802.11WEP and WPA-PSK encryption. It mainly uses two attack methods to crack WEP: one is the FMS attack, the attack is based on the names of the researchers who discovered the WEP Vulnerability (Scott Fluhrer, Itsik Mantin, and Adi Shamir), and the other is the KoreK attack.


Aircrack-ng

It can also help administrators to check the vulnerability of wireless network passwords and understand the distribution of wireless network signals. It includes a variety of tools for wireless attack auditing, it is ideal for wireless security auditing for enterprises.

V. CloudCracker

CloudCracker is a commercial version of online password cracking service that charges 20 minutes and starts at $17. In addition to providing WPA/WAP2 PSK password cracking, it can also be used to crack password protection documents and hash passwords. Attackers can quickly crack passwords by using a massive dictionary attack of 0.3 billion characters. You only need to upload the captured PA/WPA2 handshake file or the PWDUMP file of the document and hash value to crack the file immediately.

 

6. FreeRadius-WPE

 

 


CloudCracker

Although enterprises use WPA/WPA2 to perform 802.1x authorization with higher security than PSK, it still has many vulnerabilities. FreeRadius-WPE can help people better understand the attacks caused by these vulnerabilities and test network security. FreeRadius-WPE is a patch for the open-source FreeRADIUS server, designed to avoid man-in-the-middle attacks caused by 80. 1x wireless network authorization.

VII. wps pin cracking: Reaver

If you use a wireless router, watch out for a new vulnerability discovered in last December. It involves Wi-Fi protection settings on almost all wireless routes, all of which use the WPA/WPA2-PSK security protocol by default. Wps pin can be used to connect to a wireless router and easily crack these wireless devices within hours. Reaver is a Linux application that can be used to violently attack a wireless router and locate wps pin and WPA/WPA2 PSK within 4-10 hours. Of course, it also provides an easy-to-use hardware solution. Reaver Pro provides a graphical Web interface


Reaver

8. WiFish Finder

A common trick for Wi-Fi hackers is to set up a counterfeit AP or wireless honey pot wireless honeypot. Once someone connects to this AP, hackers can capture any emails in the connection and share FTP files. WiFish Finder is an open-source Linux tool that actively detects and diagnoses wireless client vulnerabilities by passively capturing wireless network traffic. It can collect the network names of wireless clients that are sending detection requests and detect network security types.



WiFish Finder

 

 

9. Jasager

Jasager is a Linux-based firmware product that provides a Linux tool to help detect vulnerable wireless clients. This is similar to WiFish Finder, however, it can also execute edevil twin or honey pot honeypot attacks.


Jasager

10. Fake AP www.2cto.com

Fake AP runs on Linux or BSD platform and generates thousands of counterfeit APS by sending SSID beacon frames. IT can be used to confuse IT administrators and intrusion detection systems.

Picture from SOFTPEDIA

 

 

11. WiFiDEnum

WiFiDEnum is a very useful tool. It can scan hosts over wired (or wireless) networks to find all installed wireless drivers and use local databases that contain known vulnerabilities, discover existing threats.


WiFiDEnum

 

12. Common Network Attacks: Nmap

Next we will introduce several eavesdropping attack tools that have appeared in the wired network over the years. These tools can also be used normally under Wi-Fi. NMap, or Network Mapper, is a Network scanning and sniffing tool kit in Linux. Nmap can be used to scan networks with only two nodes and more than 500 nodes. Nmap also allows you to customize scanning techniques.

XIII. Cain and Abel

 


Zenmap user interface

 

Cain and Abel is a password restoration, attack, and sniffing tool on Windows. This tool can detect the plaintext sent to the network.


Cain and Abel

14. Firesheep

Firesheep is a Firefox browser plug-in that can easily run sidejacking to attack some websites. For sidejackers, Wi-Fi hotspots are a special goal, because there are few hotspot-encrypted Wi-Fi data frames, so it is easy to capture these unencrypted data frames.

15. penetration testing Linux release: BackTrack

BackTrack is a self-boot running disc based on Slackware and SLAX. It contains a set of security and computer forensics tools. BackTrack is a professional computer security detection Linux operating system that can be used to crack WEP, WPA/wpa2. This tool also provides vulnerability scanning tools Nessus, penetration platform MSF, Sniff tools Wireshark, ettercap, and VOIP detection tools.


BackTrack 5

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.