Ext.: http://www.ctocio.com/security/cloudsecurity/6594.html
First, Vistumbler scanner
The WiFi scanner can find detailed information about nearby APs, such as signal strength, security mode, and MAC address. The WiFi sniffer captures the original packets from the wireless network and imports them into other tools such as decryption tools. Vistumbler, a WiFi scanner, is an open-source Windows program that can display basic AP information, such as actual authentication and encryption, and can even read SSID and RSSI. The signal strength can also be graphically displayed. Vistumbler also supports GPS devices, connecting to different local WiFi networks, and outputting data in other formats.
Second, Kismet
Kismet is an open source WiFi scanner, packet sniffer and intrusion policy system that can run on Windows, Mac OSX, Linux, and BSD. Kismet can display AP details, including hidden SSIDs, capture raw wireless packets, and analyze data into tools such as Wireshark, tcpdump, and more. In a Windows environment, Kismet can only work with the Cace Airpcap wireless network adapter, which is limited by the driver. But on Mac OSX and Linux, Kismet can be compatible with many wireless cards.
Third, WiFi Analyzer
WiFi Analyzer is a free Android app that can be used to search for AP hotspots on Android tablets and Android phones. WIFI Analyzer can display AP specific information on the 2.4GHz band, as well as devices on some 5G bands. You can send the AP information list (XML file) to the mailbox or other programs, or to the screen, WiFi Analyzer can graphically display the signal strength of each channel, history, and frequency of use, WiFi Analyzer itself is a good signal strength tester.
Four, WEP, WPA/WPA2 hack tool: Aircrack-ng
There are many tools that can crack the WiFi encryption, which is the way to crack the WPA/WPA2 PSK password by using the WEP security vulnerability or brute force dictionary attack. WPA2 AES/CCMP Encryption is still a relatively safe option. If you use WPA2 PSK mode, your password length is preferably 13-bit or more mixed characters. Before your Wi-Fi network is compromised or "rubbed off", it's a good idea to attack yourself with a hack tool first. Aircrack-ng is an open source wep/wpa/wpa2 PSK hack tool that can run on Windows, Mac OS X, Linux, and OpenBSD. Can be downloaded to a VMware image file or live CD file.
Five, Cloud Cracker
As the name implies, cloud Cracker is a commercial online password deciphering service (cloud hack) that charges $17 per 20-minute service, in addition to cracking the WPA/WPA2 PSK password, which can also be used to decipher hashed encrypted password-protected documents. Cloudcracker Dictionary has 300 million passwords, powerful computing power, you just need to crack wpa/wpa2 handshake file or pwdump file upload, the rest will be given to the cloud cracker.
Liu, Freeradius-wpe
Although the enterprise-class WPA/WPA2 based on the 802.1X authentication protocol is more secure than PSK, there are still security vulnerabilities. The Freeradius-wpe tool can help you understand attacks against your corporate WiFi network and better protect your network. FREERADIUS-WPE is a patch pack for open source software Freeradius that can launch a man-in-the-middle attack on a WiFi network that uses 802.1X authentication.
Seven, Reaver
If you are using a wireless router, then you need to pay attention to a security vulnerability found at the end of last year: Many router vendors provide WPS (one-click Authentication mode, user-friendly router device connection authentication) PIN code can be cracked within a few hours. Reaver is such a tool that Reaver is a Linux program that can violently hack the WPS pin and WPA/WPA2 PSK password of a wireless router within 4-10 hours. Reaver also offers a handy, dedicated hardware solution: Reaver Pro, which has a graphical web operator interface.
Eight, Wifish Finder
One of the most frequently used means of WiFi hacking is to assume a fake AP hotspot, known as an "evil twin AP" or "Wireless honeypot." When someone mistakenly links to this AP, the hacker can capture any e-mail and FTP link data that the user uses, and even access the user's shared files. The fake AP tool can also use fake DNS caches to display fake hotspots or site landing pages to get user login accounts. The Wifish Finder is an open source Linux program that can passively capture wireless network data and proactively detect and discover vulnerable wireless clients. The Wifish Finder can generate a list of network names for client requests and detect the security types of these requested networks.
Nine, wireless honeypot: Jasager
Jasager (based on Karma) is a Linux firmware that provides a set of Linux tools to discover security vulnerabilities for wireless clients, similar to the Wifish Finder, but the biggest difference is that it can be used for wireless honeypot attacks. The Jasager can be run on the FON or WiFi Pineapple router. It can configure a soft AP to generate the SSID of a nearby wireless client search, as well as provide DHCP, DNS, and HTTP services to wireless clients. Where the HTTP server can speak network access requests directed to a specific Web site. Jasager can also capture and display the plaintext pop, FTP, or HTTP login information for any victim. Jasager has a web-based command-line interface.
Ten, Fake AP
The Fake AP runs on Linux and BSD systems and can generate thousands of phishing APS by emitting SSID frames. Fake APs can be used by attackers to confuse IT staff or intrusion policy systems, but can also be used by ordinary consumers to confuse street hackers.
Xi. Wifidenum
Wifidenum (WiFi drive counter) is a Windows program that can help identify wireless network device driver vulnerabilities and protect against attacks that exploit wireless vulnerabilities. Ability to scan limited or wireless workstation networks, mobile phone wireless card driver details, and identify potential security vulnerabilities.
12, Nmap
Many old wired network eavesdropping and attack tools can actually be used in wireless networks, such as Nmap, an open-source TCP/IP scanner that can be used to discover hosts and clients on the network, and Nmap can run on Windows, Linux, Mac OS x, has a graphical interface and a command-line interface. Nmap can report on the operating system information on the network, the types of services provided, and packet filters or firewall types, to help identify insecure hosts or ports.
13, Cain and Abel
Cain and Abel are password recovery, cracking, and sniffing tools on windows that can be used to show how to sniff a password from a network.
14. Firesheep Fire Sheep
Fire Sheep Firesheep is a Firefox plugin capable of HTTP session hijacking, or bypass hijacking. The fire sheep can monitor the user's Web login information and exchange the login cookie in the network, that is, as long as the fire sheep scan to your website login cookie, the computer running the fire sheep can login to the same website as you, such as online banking, online shop, social network and web e-mail, without entering the password account.
XV, BackTrack
If you want a serious intrusion test, consider a very popular Linux-specific software--backtrack, which presets more than 320 intrusion testing tools that can be widely used in the areas of networking, Web servers, and so on. You can install the backtrack on your hard drive, or install it on a self-booting CD or USB flash drive.
Transfer 15 free WiFi (intrusion) security Test tool