WIFI HACKING TOOLS

WIFI HACKING TOOLS

5 BEST WIFI HACKING TOOLS

1. AirSnort

AirSnort is another popular tool for decrypting WEP encryption on a wi-fi 802.11b network. It is a free tool and comes with Linux and Windows platforms. This tool is no longer maintained, but it is still available to download from Sourceforge. AirSnort works by passively monitoring transmissions and computing encryption keys once it has enough packets received. This tool is simple to use. If you are interested, you can try this tool to crack WEP passwords.

2. Cain & Able

Cain & Able is a popular password cracking tool. This tool is developed to intercept network traffic and then discover passwords by bruteforcing the password using cryptanalysis attack methods. It can also recover wireless network keys by analyzing routing protocols. It you are trying to learn wireless security and password cracking, you should once try this tool.

3. Kismet

Kismet is the wi-fi 802.11 a/b/g/n layer2 wireless network sniffer and IDS. It works with any wi-fi card which supports rfmon mode. It passively collects packets to identify networks and detect hidden networks. It is built on client/server modular architecture. It is available for Linux, OSX, Windows and BSD platforms.

4. Airjack

Airjack is a Wi-Fi 802.11 packet injection tool. This wireless cracking tool is very useful in injecting forged packets and making a network down by denial of service attack. This tool can also be used for a man in the middle attack in the network.

5. WepAttack

WepAttack is an open source Linux tool for breaking 802.11 WEP keys. This tool performs an active dictionary attack by testing millions of words to find the working key. Only a working WLAN card is required to work with WepAttack.


Dictionary

Abbreviations

DDoS = Distributed Denial of Service

DDoS = Distributed Reflected Denial of Service Attack, uses a list of reflection servers or other methods such as DNS to spoof an attack to look like it's coming from multiple IPs. Amplification of power in the attack COULD occur.

FTP =File Transfer Protocol. Used for transferring files over an FTP server.

FUD = Fully Undetectable

Hex =In computer science, hexadecimal refers to base-16 numbers. These are numbers that use digits in the range: 0123456789ABCDEF. In the C programming language (as well as Java, JavaScript, C++, and other places), hexadecimal numbers are prefixed by a 0x. In this manner, one can tell that the number 0x80 is equivalent to 128 decimal, not 80 decimal.

HTTP =Hyper Text Transfer Protocol. The foundation of data communication for the World Wide Web.

IRC = Internet Relay Chat. Transmitting text messages in real-time between online users.

JDB =Java drive-by, a very commonly used web-based exploit that allows an attacker to download and execute malicious code locally on a slave's machine through a widely known java vulnerability.

Malware =Malicious Software

 Nix = Unix based operating system, usually referred to here when referring to DoS'ing.

POP3 =This is the most popular protocol for picking up e-mail from a server.

R.A.T = Remote Administration Tool

SDB = Silent drive-by, using a zero-day web-based exploit to hiddenly and un-detectably download and execute malicious code on a slave's system. (similar to a JDB however no notification or warning is given to the user)

SE = Social Engineering

Skid =Script Kid/Script Kiddie

SMTP =A TCP/IP protocol used in sending and receiving e-mail.

SQL =Structured Query Language. It's a programming language, that used to communicate with databases and DBMS. Can go along with a word after it, such as "SQL Injection."

SSH =Secure Shell, used to connect to Virtual Private Servers.

TCP = Transmission Control Protocol creates connections and exchanges packets of data.

UDP =User Datagram Protocol, An alternative data transport to TCP used for DNS, Voice over IP, and file sharing.

VPN =Virtual Private Network

 VPS =Virtual Private Server

XSS (CSS) = Cross-Site Scripting


Words


Algorithm

A series of steps specifying which actions to take in which order.

ANSI Bomb

ANSI.SYS key-remapping commands consist of cryptic-looking text that specifies, using ANSI numeric codes to redefine keys.

Back Door

Something a hacker leaves behind on a system in order to be able to get back in at a later time.

Binary

A numbering system in which there are only two possible values for each digit: 0 and 1.

Black Hat

A hacker who performs illegal actions to do with hacking online. (Bad guy, per se)

Blue Hat

A blue hat hacker is someone outside computer security consulting firms who is used to bug test a system prior to its launch, looking for exploits so they can be closed. Microsoft also uses the term BlueHat to represent a series of security briefing events.

Bot

A piece of malware that connects the computer to an attacker commonly using the HTTP or IRC protocol to await malicious instructions.

Botnet

Computers infected by worms or Trojans and taken over by hackers and brought into networks to send spam, more viruses, or launch denial of service attacks.

Buffer Overflow

A classic exploit that sends more data than a programmer expects to receive. Buffer overflows are one of the most common programming errors, and the ones most likely to slip through quality assurance testing.

Cracker

A specific type of hacker who decrypts passwords


要查看或添加评论,请登录

Mohammad Ismail Hossan的更多文章

  • Cheatsheet for Kubernetes Setup

    Cheatsheet for Kubernetes Setup

    # Get commands with basic output kubectl get services # List all services in the namespace kubectl get pods…

  • CLOUD COMPUTING

    CLOUD COMPUTING

    WHAT IS THE CLOUD? The Cloud is shorthand to describe the huge interconnected network of servers designed to deliver…

  • How to choose a VPN ?

    How to choose a VPN ?

    The best way to stay secure when using public Wi-Fi is to use a VPN solution, like Norton Secure VPN, which is…

  • What Are The Risks Of Using A Public Wi-Fi?

    What Are The Risks Of Using A Public Wi-Fi?

    The problem with public Wi-Fi is that there are a tremendous number of risks that go along with these networks. While…

  • How To Combine Two Wifi Connections To Get A Faster Internet

    How To Combine Two Wifi Connections To Get A Faster Internet

    You have more than one active internet connections and you are using only one at a time, while the other is resting?…

  • Hacking Terms

    Hacking Terms

    ??Adware ? Adware is software designed to force pre-chosen ads to display on your system. ??Attack ? An attack is an…

  • CYBERSECURITY

    CYBERSECURITY

    These are the top 10 Android Apps That Turn Your Phone into a Hacking Device. 1.

  • Hacking Techniques

    Hacking Techniques

    Top 10 Common Hacking Techniques All Beginners Should Know About 10. Keylogger Keylogger is a simple software that…

社区洞察

其他会员也浏览了