Transfer 15 free WiFi (intrusion) security Test tool

Source: Internet
Author: User
Tags wifi sniffer freeradius firesheep wpa2 hack

Ext.: http://www.ctocio.com/security/cloudsecurity/6594.html

First, Vistumbler scanner

The WiFi scanner can find detailed information about nearby APs, such as signal strength, security mode, and MAC address. The WiFi sniffer captures the original packets from the wireless network and imports them into other tools such as decryption tools. Vistumbler, a WiFi scanner, is an open-source Windows program that can display basic AP information, such as actual authentication and encryption, and can even read SSID and RSSI. The signal strength can also be graphically displayed. Vistumbler also supports GPS devices, connecting to different local WiFi networks, and outputting data in other formats.

Second, Kismet

Kismet is an open source WiFi scanner, packet sniffer and intrusion policy system that can run on Windows, Mac OSX, Linux, and BSD. Kismet can display AP details, including hidden SSIDs, capture raw wireless packets, and analyze data into tools such as Wireshark, tcpdump, and more. In a Windows environment, Kismet can only work with the Cace Airpcap wireless network adapter, which is limited by the driver. But on Mac OSX and Linux, Kismet can be compatible with many wireless cards.

Third, WiFi Analyzer

WiFi Analyzer is a free Android app that can be used to search for AP hotspots on Android tablets and Android phones. WIFI Analyzer can display AP specific information on the 2.4GHz band, as well as devices on some 5G bands. You can send the AP information list (XML file) to the mailbox or other programs, or to the screen, WiFi Analyzer can graphically display the signal strength of each channel, history, and frequency of use, WiFi Analyzer itself is a good signal strength tester.

Four, WEP, WPA/WPA2 hack tool: Aircrack-ng

There are many tools that can crack the WiFi encryption, which is the way to crack the WPA/WPA2 PSK password by using the WEP security vulnerability or brute force dictionary attack. WPA2 AES/CCMP Encryption is still a relatively safe option. If you use WPA2 PSK mode, your password length is preferably 13-bit or more mixed characters. Before your Wi-Fi network is compromised or "rubbed off", it's a good idea to attack yourself with a hack tool first. Aircrack-ng is an open source wep/wpa/wpa2 PSK hack tool that can run on Windows, Mac OS X, Linux, and OpenBSD. Can be downloaded to a VMware image file or live CD file.

Five, Cloud Cracker

As the name implies, cloud Cracker is a commercial online password deciphering service (cloud hack) that charges $17 per 20-minute service, in addition to cracking the WPA/WPA2 PSK password, which can also be used to decipher hashed encrypted password-protected documents. Cloudcracker Dictionary has 300 million passwords, powerful computing power, you just need to crack wpa/wpa2 handshake file or pwdump file upload, the rest will be given to the cloud cracker.

Liu, Freeradius-wpe

Although the enterprise-class WPA/WPA2 based on the 802.1X authentication protocol is more secure than PSK, there are still security vulnerabilities. The Freeradius-wpe tool can help you understand attacks against your corporate WiFi network and better protect your network. FREERADIUS-WPE is a patch pack for open source software Freeradius that can launch a man-in-the-middle attack on a WiFi network that uses 802.1X authentication.

Seven, Reaver

If you are using a wireless router, then you need to pay attention to a security vulnerability found at the end of last year: Many router vendors provide WPS (one-click Authentication mode, user-friendly router device connection authentication) PIN code can be cracked within a few hours. Reaver is such a tool that Reaver is a Linux program that can violently hack the WPS pin and WPA/WPA2 PSK password of a wireless router within 4-10 hours. Reaver also offers a handy, dedicated hardware solution: Reaver Pro, which has a graphical web operator interface.

Eight, Wifish Finder

One of the most frequently used means of WiFi hacking is to assume a fake AP hotspot, known as an "evil twin AP" or "Wireless honeypot." When someone mistakenly links to this AP, the hacker can capture any e-mail and FTP link data that the user uses, and even access the user's shared files. The fake AP tool can also use fake DNS caches to display fake hotspots or site landing pages to get user login accounts. The Wifish Finder is an open source Linux program that can passively capture wireless network data and proactively detect and discover vulnerable wireless clients. The Wifish Finder can generate a list of network names for client requests and detect the security types of these requested networks.

Nine, wireless honeypot: Jasager

Jasager (based on Karma) is a Linux firmware that provides a set of Linux tools to discover security vulnerabilities for wireless clients, similar to the Wifish Finder, but the biggest difference is that it can be used for wireless honeypot attacks. The Jasager can be run on the FON or WiFi Pineapple router. It can configure a soft AP to generate the SSID of a nearby wireless client search, as well as provide DHCP, DNS, and HTTP services to wireless clients. Where the HTTP server can speak network access requests directed to a specific Web site. Jasager can also capture and display the plaintext pop, FTP, or HTTP login information for any victim. Jasager has a web-based command-line interface.

Ten, Fake AP

The Fake AP runs on Linux and BSD systems and can generate thousands of phishing APS by emitting SSID frames. Fake APs can be used by attackers to confuse IT staff or intrusion policy systems, but can also be used by ordinary consumers to confuse street hackers.

Xi. Wifidenum

Wifidenum (WiFi drive counter) is a Windows program that can help identify wireless network device driver vulnerabilities and protect against attacks that exploit wireless vulnerabilities. Ability to scan limited or wireless workstation networks, mobile phone wireless card driver details, and identify potential security vulnerabilities.

12, Nmap

Many old wired network eavesdropping and attack tools can actually be used in wireless networks, such as Nmap, an open-source TCP/IP scanner that can be used to discover hosts and clients on the network, and Nmap can run on Windows, Linux, Mac OS x, has a graphical interface and a command-line interface. Nmap can report on the operating system information on the network, the types of services provided, and packet filters or firewall types, to help identify insecure hosts or ports.

13, Cain and Abel

Cain and Abel are password recovery, cracking, and sniffing tools on windows that can be used to show how to sniff a password from a network.

14. Firesheep Fire Sheep

Fire Sheep Firesheep is a Firefox plugin capable of HTTP session hijacking, or bypass hijacking. The fire sheep can monitor the user's Web login information and exchange the login cookie in the network, that is, as long as the fire sheep scan to your website login cookie, the computer running the fire sheep can login to the same website as you, such as online banking, online shop, social network and web e-mail, without entering the password account.

XV, BackTrack

If you want a serious intrusion test, consider a very popular Linux-specific software--backtrack, which presets more than 320 intrusion testing tools that can be widely used in the areas of networking, Web servers, and so on. You can install the backtrack on your hard drive, or install it on a self-booting CD or USB flash drive.

Transfer 15 free WiFi (intrusion) security Test tool

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.