Online Extra: How hackers work

Want to know more about wireless network vulnerabilities and how hackers exploit them? Visit these sites:

AirJack (wlan-jack, essid-jack, monkey-jack, kracker-jack)
802.11ninja.net

AirSnort for stealing encryption keys
airsnort.shmoo.com

Brute-force attacks on 802.11 Wired Equivalent Privacy
www.thehackerschoice.com/releases.php

Ethereal wireless protocol analyzer
www.ethereal.com

gKismet graphical interface for Kismet wireless sniffer
gkismet.sourceforge.net

GPSDrive for Global Positioning System navigation by hackers
gpsdrive.kraftvoll.at

Key cracking
airsnort.sourceforge.net

Kismet wireless sniffer
www.kismetwireless.net

Netstumbler antenna kit with PC Card
www.netstumbler.com

Network monitoring and general hacking trends


Void11 implementation of basic 802.11 attacks
www.wlsec.net/void11

Wellenreiter wireless scanner
< ahref="http://www.remote-exploit.org">www.remote-exploit.org

WepAttack for breaking 802.11 WEP keys
www.wepattack.sourceforge.net

Wireless access point utilities for Linux
ap-utils.polesye.net

About the Author

John Breeden II is a freelance technology writer for GCN.

Reader Comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above