Wardriving These Days (Part 2)

Tools for the first part may not be completed without SpoonWEP/SpoonWPA which firstly introduced in BackTrack3, this is also a part of aircrack-ng with a graphical interface allows pentester to take the same channel of the Access point and crack the security keys of the AP.
Another very interesting tool is Karmetasploit which allows you to fake access points, capture passwords, harvest data, and conduct browser attacks against clients.

Wireless penetration testing does not exist as programs only as in Backtrack but you can find a ready solution as the wifi peanaple. which is a nice trick that any person at home, the office, coffee shops or airports will not doubt that the peanaple contains a rogue access point that may conduct a Man in the middle attack and have all users credential, the price of WiFi Pineapple is 119$.

When any person turn on their laptops the wireless network software automatically connects to access points they remember. So the laptop starts to send out beacons. These beacons say “Is such-and-such wireless network around?” , wifi peanaple replies to these beacons and says “Sure, I’m such-and-such wireless access point – let’s get you online!”.

WiFi Pineapple is powered over battery and wireless hacking device based on the Fon 2100 access point.

make sure you subscribe to my RSS feed!

Share
  • Pingback: Mourad ben lakhoua

  • Pingback: Mourad Ben Lakhoua

  • Pingback: Tweets that mention Wardriving These Days (Part 2) | SecTechno -- Topsy.com

  • Pingback: Cyber Informer

  • Pingback: Seeb

  • Pingback: SecureArabia

  • Pingback: Win Security

  • Pingback: Mourad Ben Lakhoua

  • Pingback: A Grego

  • Pingback: Seeb

  • Pingback: SecureArabia