For enterprise IT managers and network administrators, the best way to protect a relatively fragile WiFi network is to hack into your own wireless network with the most popular and "hot" tools in hacker circles and figure out a network security vulnerability And targeted reinforcement. Here are 15 free (nearly free) WiFi network intrusion detection tools introduced by cio.com. These tools will help you discover the security risks of rogue APs and weak Wi-Fi passwords, and make up for the vulnerabilities before hackers visit.
1, Vistumbler scanner
The WiFi scanner can discover details of nearby APs, such as signal strength, security mode and MAC address. WiFi sniffers, on the other hand, capture the raw packets of the wireless network and import these packets into other tools such as decryption tools. Vistumbler, a WiFi scanner, is an open source Windows program that displays basic AP information such as authentication and encryption, and even reads SSID and RSSI. Also graphically shows the signal strength. Vistumbler also supports GPS devices, with different local WiFi network connection, the output of other formats of data.
Kismet is an open source WiFi scanner, packet sniffer and intrusion policy system that runs on windows, Mac OSX, Linux and BSD. Kismet can display AP details, including hidden SSIDs, as well as raw wireless packets, and import data into tools such as Wireshark and TCPdump for analysis. In the Windows environment, subject to the driver, Kismet only works with CACE AirPcap wireless cards. But on Mac OSX and Linux, Kismet is compatible with many wireless cards.
3, WiFi Analyzer
WiFi Analyzer is a free Android app that can be used to search for AP Hotspots on Android tablets and Android phones. The WiFi Analyzer can show the AP specific information in the 2.4GHz band and some of the devices in the 5G band. You can send the AP information list (XML file) to the mailbox or other programs, or you can take a screenshot of the screen. The WiFi Analyzer can graphically display the channel signal strength, history, and frequency of use, and the WiFi Analyzer itself is a good one Signal intensity detector.
4, WEP, WPA / WPA2 crack tool: Aircrack-ng
There are many tools that can crack WiFi encryption, but they can only crack WPA / WPA2 PSK passwords by using WEP security flaw or violent dictionary attack. WPA2 AES / CCMP encryption is still a relatively safe choice. If using WPA2 PSK mode, then your password length is preferably more than 13 mixed characters. Before your Wi-Fi network is compromised or "rub", it is best to use self-cracking tools to attack. Aircrack-ng is an open source WEP / WPA / WPA2 PSK cracker that runs on Windows, Mac OS X, Linux and OpenBSD. You can download to VMware images or Live CD files.
5, Cloud Cracker
As its name implies, Cloud Cracker is a commercial online password cracking service (cloud cracking) that charges $ 17 per 20-minute service and can be used to crack hashed encrypted password protected documents in addition to cracking WPA / WPA2 PSK passwords. CloudCracker dictionary 300 million passwords, computing power, you only need to crack the WPA / WPA2 handshake file or PWDUMP file upload, the rest to Cloud Cracker.
Although enterprise class WPA / WPA2 based on the 802.1X authentication protocol is safer than PSK, there are still security vulnerabilities. FreeRadius-WPE tool can help you understand the attacks on the enterprise WiFi network and better protect the network. FreeRadius-WPE is a patch for the open source FreeRADIUS software that enables man-in-the-middle attacks on WiFi networks that use 802.1X authentication.
If you are using a wireless router, then you need to pay attention to a security hole found late last year: Many router manufacturers provide WPS (one-button authentication mode, user-friendly to complete the router device connection authentication) PIN code can be cracked within hours . Reaver is one such tool. Reaver is a Linux program that can brute force WPS PIN and WPA / WPA2 PSK passwords for wireless routers in 4-10 hours. Reaver also offers a handy, dedicated hardware solution: Reaver Pro, with a graphical web interface.
8, WiFish Finder
One of the most frequently used means of WiFi hackers is to hypothesize the fake AP hotspots, so-called "evil twin APs" or "wireless honeypots." When someone mistakenly links to this AP, hackers can capture any e-mail and FTP link data the user uses and can even access the user's shared files. Counterfeit AP tools can also fake DNS cache to display fake hotspots or website landing page to obtain user login account. WiFish Finder is an open source Linux program that captures wireless network data passively and proactively detects and discovers vulnerable wireless clients. The WiFish Finder can generate a list of network requests for client requests and detect the type of security for those requested networks.
9, wireless honeypot: Jasager
Jasager (based on KARMA) is a Linux firmware that provides a set of Linux tools to discover wireless client vulnerabilities similar to WiFish Finder, but the big difference is that it can be used for wireless honeypot attacks. Jasager can run on FON or WiFi Pineapple router. It can configure soft APs, generate SSIDs for nearby wireless clients, and provide DHCP, DNS, and HTTP services to wireless clients. The HTTP server can tell network access requests to specific websites. Jasager also captures and displays the plaintext POP, FTP, or HTTP login information for any victim. Jasager has a web-based command line interface.
10, Fake AP
Fake AP runs on Linux and BSD systems and can generate thousands of fake APs by transmitting SSID frames. Fake APs can be used by attackers to confuse IT staff or intrusion policy systems, but can also be used by average consumers to confuse street hackers.
WiFiDEnum (WiFi Driver Counter) is a windows program that helps discover wireless network device driver vulnerabilities and protects against exploits of wirelessly-driven vulnerabilities. The ability to scan for limited or wireless Workstation network, mobile wireless card driver details, and identify potential security vulnerabilities.
Many veteran cable eavesdropping and attack tools can actually be used for wireless networks such as Nmap, an open source TCP / IP scanner that can be used to discover hosts and clients in the network. Nmap can run on windows, Linux, Mac OS X, has a graphical interface and command line interface. Nmap can report operating system information on the network, types of services provided, packet filters, or firewall types to help find unsecured hosts or ports.
13, Cain and Abel
Cain and Abel are password-recovery, cracking and sniffing tools on Windows that can be used to show how to sniff out plain text passwords from the web.
14, Firesheep fire sheep
Fire Sheep Firesheep is a Firefox plugin capable of HTTP session hijacking, which is bypassing hijacking. Fire sheep can monitor user web login information in the network and exchange login cookie, that is to say as long as the fire sheep scans your website login cookie, the computer running the sheep can enter the same website as you need without inputting the password account , Such as online banking, online stores, social networks and web e-mail.
Consider a very popular Linux-specific software - BackTrack, the software preset more than 320 intrusion testing tools, can be widely used in the field of web, web servers and so on. You can install BackTrack to your hard drive or install it from a bootable CD or USB drive.