Online Extra: How hackers work

Want to know more about wireless network vulnerabilities and how hackers exploit them? Visit these sites:

AirJack (wlan-jack, essid-jack, monkey-jack, kracker-jack)

AirSnort for stealing encryption keys

Brute-force attacks on 802.11 Wired Equivalent Privacy

Ethereal wireless protocol analyzer

gKismet graphical interface for Kismet wireless sniffer

GPSDrive for Global Positioning System navigation by hackers

Key cracking

Kismet wireless sniffer

Netstumbler antenna kit with PC Card

Network monitoring and general hacking trends

Void11 implementation of basic 802.11 attacks

Wellenreiter wireless scanner
< ahref="">

WepAttack for breaking 802.11 WEP keys

Wireless access point utilities for Linux

About the Author

John Breeden II is a freelance technology writer for GCN.

Stay Connected

Sign up for our newsletter.

I agree to this site's Privacy Policy.