X hits on this document

30 views

0 shares

0 downloads

0 comments

10 / 12

Wireless Hacking Tools

http://www.cse.wustl.edu/~jain/cse571-07/ftp/wireless_hacking/

will continue to evolve to keep unauthorized devices from connecting to a wireless network. However, even the latest security methods have their weaknesses. For example, WPA2, the latest encryption method, does not address the problem of dissociation and deauthentication attacks, but does address many of the issues with WEP.

The attack tools are easy to obtain, easy to install, and have detailed web pages or forums that include directions on how to obtain, install and use. Many of the tools are multi-platform which makes it even easier to use. As the network security field grows in complexity, the attack tools will evolve.

Back to Table of Contents

References

These reference are ordered approximately in usefulness and relevance to this survey paper.

[1] "Wireless Attacks A to Z", http://searchsecurity.techtarget.com/generic/0,295582,sid14_gci1167611,00.html March, 2006

[2] "Top 5 Wireless Tools", http://sectools.org/wireless.html, 2006

[3] "The Top 10 Hacker Attack Tools", http://www.thenetworkadministrator.com/2005tophackingtools.htm

[4] "Recon and Attack Tools", http://www.wi-foo.com/index-3.html

[5] "Wireless Attack Primer", http://www.windowsecurity.com/articles/Wireless_Attacks_Primer.html, July 2004

[6] "AirSnort", http://airsnort.shmoo.com/, The Schmoo Group

[7] "AirCrack", http://www.wirelessdefence.org/Contents/AircrackMain.htm

[8] "Ettercap", http://ettercap.sourceforge.net/

[9] Song, D., "dsniff", http://monkey.org/~dugsong/dsniff/

[10] Combs, G., "Wireshark", http://www.wireshark.org/

[11] Moser, M., "Hotspotter - Automatic wireless client penetration", http://www.remote-exploit.org/codes_hotspotter.html

[12] "APsniff", http://www.zdnet.de/downloads/prg/w/i/de0DWI-wc.html, April 2004

[13] "APhunter", http://www.attackprevention.com/article/aphunter-2618.html

[14] "KNSGEM", http://www.rjpi.com/knsgem.htm

[15] "HermesAP", http://hunz.org/hermesap.html

[16] "OpenAP", http://www.seattlewireless.net/OpenAP

[17] "OpenWRT", http://openwrt.org/

[18] "HyperWRT", http://hyperwrt.org/

[19] "Airpwn", http://airpwn.sourceforge.net/Airpwn.html July, 2006

[20] "File2air", http://www.wolfslair.nl/php/modules.php?name=News&file=article&sid=62

10 of 12

12/19/2007 5:16 PM

Document info
Document views30
Page views30
Page last viewedThu Dec 08 05:59:57 UTC 2016
Pages12
Paragraphs242
Words4393

Comments