WIFI HACKING TOOLS
5 BEST WIFI HACKING TOOLS
1. AirSnort
AirSnort is another popular tool for decrypting WEP encryption on a wi-fi 802.11b network. It is a free tool and comes with Linux and Windows platforms. This tool is no longer maintained, but it is still available to download from Sourceforge. AirSnort works by passively monitoring transmissions and computing encryption keys once it has enough packets received. This tool is simple to use. If you are interested, you can try this tool to crack WEP passwords.
2. Cain & Able
Cain & Able is a popular password cracking tool. This tool is developed to intercept network traffic and then discover passwords by bruteforcing the password using cryptanalysis attack methods. It can also recover wireless network keys by analyzing routing protocols. It you are trying to learn wireless security and password cracking, you should once try this tool.
3. Kismet
Kismet is the wi-fi 802.11 a/b/g/n layer2 wireless network sniffer and IDS. It works with any wi-fi card which supports rfmon mode. It passively collects packets to identify networks and detect hidden networks. It is built on client/server modular architecture. It is available for Linux, OSX, Windows and BSD platforms.
4. Airjack
Airjack is a Wi-Fi 802.11 packet injection tool. This wireless cracking tool is very useful in injecting forged packets and making a network down by denial of service attack. This tool can also be used for a man in the middle attack in the network.
5. WepAttack
WepAttack is an open source Linux tool for breaking 802.11 WEP keys. This tool performs an active dictionary attack by testing millions of words to find the working key. Only a working WLAN card is required to work with WepAttack.
Dictionary
Abbreviations
DDoS = Distributed Denial of Service
DDoS = Distributed Reflected Denial of Service Attack, uses a list of reflection servers or other methods such as DNS to spoof an attack to look like it's coming from multiple IPs. Amplification of power in the attack COULD occur.
FTP =File Transfer Protocol. Used for transferring files over an FTP server.
FUD = Fully Undetectable
Hex =In computer science, hexadecimal refers to base-16 numbers. These are numbers that use digits in the range: 0123456789ABCDEF. In the C programming language (as well as Java, JavaScript, C++, and other places), hexadecimal numbers are prefixed by a 0x. In this manner, one can tell that the number 0x80 is equivalent to 128 decimal, not 80 decimal.
HTTP =Hyper Text Transfer Protocol. The foundation of data communication for the World Wide Web.
IRC = Internet Relay Chat. Transmitting text messages in real-time between online users.
JDB =Java drive-by, a very commonly used web-based exploit that allows an attacker to download and execute malicious code locally on a slave's machine through a widely known java vulnerability.
Malware =Malicious Software
Nix = Unix based operating system, usually referred to here when referring to DoS'ing.
POP3 =This is the most popular protocol for picking up e-mail from a server.
R.A.T = Remote Administration Tool
SDB = Silent drive-by, using a zero-day web-based exploit to hiddenly and un-detectably download and execute malicious code on a slave's system. (similar to a JDB however no notification or warning is given to the user)
SE = Social Engineering
Skid =Script Kid/Script Kiddie
SMTP =A TCP/IP protocol used in sending and receiving e-mail.
SQL =Structured Query Language. It's a programming language, that used to communicate with databases and DBMS. Can go along with a word after it, such as "SQL Injection."
SSH =Secure Shell, used to connect to Virtual Private Servers.
TCP = Transmission Control Protocol creates connections and exchanges packets of data.
UDP =User Datagram Protocol, An alternative data transport to TCP used for DNS, Voice over IP, and file sharing.
VPN =Virtual Private Network
VPS =Virtual Private Server
XSS (CSS) = Cross-Site Scripting
Words
Algorithm
A series of steps specifying which actions to take in which order.
ANSI Bomb
ANSI.SYS key-remapping commands consist of cryptic-looking text that specifies, using ANSI numeric codes to redefine keys.
Back Door
Something a hacker leaves behind on a system in order to be able to get back in at a later time.
Binary
A numbering system in which there are only two possible values for each digit: 0 and 1.
Black Hat
A hacker who performs illegal actions to do with hacking online. (Bad guy, per se)
Blue Hat
A blue hat hacker is someone outside computer security consulting firms who is used to bug test a system prior to its launch, looking for exploits so they can be closed. Microsoft also uses the term BlueHat to represent a series of security briefing events.
Bot
A piece of malware that connects the computer to an attacker commonly using the HTTP or IRC protocol to await malicious instructions.
Botnet
Computers infected by worms or Trojans and taken over by hackers and brought into networks to send spam, more viruses, or launch denial of service attacks.
Buffer Overflow
A classic exploit that sends more data than a programmer expects to receive. Buffer overflows are one of the most common programming errors, and the ones most likely to slip through quality assurance testing.
Cracker
A specific type of hacker who decrypts passwords