Online Extra: How hackers work

Want to know more about wireless network vulnerabilities and how hackers exploit them? Visit these sites:

AirJack (wlan-jack, essid-jack, monkey-jack, kracker-jack)

AirSnort for stealing encryption keys

Brute-force attacks on 802.11 Wired Equivalent Privacy

Ethereal wireless protocol analyzer

gKismet graphical interface for Kismet wireless sniffer

GPSDrive for Global Positioning System navigation by hackers

Key cracking

Kismet wireless sniffer

Netstumbler antenna kit with PC Card

Network monitoring and general hacking trends

Void11 implementation of basic 802.11 attacks

Wellenreiter wireless scanner
< ahref="">

WepAttack for breaking 802.11 WEP keys

Wireless access point utilities for Linux

About the Author

John Breeden II is a freelance technology writer for GCN.

inside gcn

  • When cybersecurity capabilities are paid for, but untapped

Reader Comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group